A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
References
Link | Resource |
---|---|
http://syncope.apache.org/security | Vendor Advisory |
http://syncope.apache.org/security | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://syncope.apache.org/security - Vendor Advisory |
Information
Published : 2020-05-04 13:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1959
Mitre link : CVE-2020-1959
CVE.ORG link : CVE-2020-1959
JSON object : View
Products Affected
apache
- syncope
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')