mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
116 lines
4.6 KiB
JSON
116 lines
4.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2020-5245",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Remote Code Execution (RCE) vulnerability in dropwizard-validation"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "dropwizard-validation",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "< 1.3.19"
|
|
},
|
|
{
|
|
"version_value": ">= 2.0.0, < 2.0.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "dropwizard"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 7.9,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf"
|
|
},
|
|
{
|
|
"name": "https://github.com/dropwizard/dropwizard/pull/3157",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/dropwizard/dropwizard/pull/3157"
|
|
},
|
|
{
|
|
"name": "https://github.com/dropwizard/dropwizard/pull/3160",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/dropwizard/dropwizard/pull/3160"
|
|
},
|
|
{
|
|
"name": "https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634"
|
|
},
|
|
{
|
|
"name": "https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation",
|
|
"refsource": "MISC",
|
|
"url": "https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation"
|
|
},
|
|
{
|
|
"name": "https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions",
|
|
"refsource": "MISC",
|
|
"url": "https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions"
|
|
},
|
|
{
|
|
"name": "https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm",
|
|
"refsource": "MISC",
|
|
"url": "https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-3mcp-9wr4-cjqf",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |