Netflix Titus uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
References
Link | Resource |
---|---|
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-06-16 14:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-9296
Mitre link : CVE-2020-9296
CVE.ORG link : CVE-2020-9296
JSON object : View
Products Affected
netflix
- conductor
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')