Netflix Titus uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
References
Link | Resource |
---|---|
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md | Third Party Advisory |
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md - Third Party Advisory |
Information
Published : 2020-06-16 14:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9296
Mitre link : CVE-2020-9296
CVE.ORG link : CVE-2020-9296
JSON object : View
Products Affected
netflix
- conductor
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')