CVE Vulnerabilities

CVE-2023-32200

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

Published: Jul 12, 2023 | Modified: Jul 20, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

There is insufficient restrictions of called script functions in Apache Jena versions 4.8.0 and earlier. It allows a remote user to execute javascript via a SPARQL query. This issue affects Apache Jena: from 3.7.0 through 4.8.0.

Weakness

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.

Affected Software

Name Vendor Start Version End Version
Jena Apache 3.7.0 (including) 4.8.0 (including)
Apache-jena Ubuntu bionic *
Apache-jena Ubuntu kinetic *
Apache-jena Ubuntu lunar *
Apache-jena Ubuntu mantic *
Apache-jena Ubuntu trusty *
Apache-jena Ubuntu xenial *

Potential Mitigations

  • If user-controlled data must be added to an expression interpreter, one or more of the following should be performed:

References