CVE Vulnerabilities

CVE-2018-12533

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

Published: Jun 18, 2018 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
9.8 CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.

Weakness

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.

Affected Software

NameVendorStart VersionEnd Version
RichfacesRedhat3.1.0 (including)3.3.4 (including)
Red Hat JBoss EAP 5RedHatRichFaces*
Red Hat JBoss Enterprise Application Platform 5 for RHEL 5RedHatrichfaces-0:3.3.1-7.SP3_patch_02.ep5.el5*
Red Hat JBoss Enterprise Application Platform 5 for RHEL 6RedHatrichfaces-0:3.3.1-4.SP3_patch_02.ep5.el6_10*
Red Hat JBoss Operations Network 3.3RedHatRichFaces*

Potential Mitigations

  • If user-controlled data must be added to an expression interpreter, one or more of the following should be performed:

References