Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
References
Link | Resource |
---|---|
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md | Patch Third Party Advisory |
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md - Patch, Third Party Advisory |
Information
Published : 2020-07-14 20:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9297
Mitre link : CVE-2020-9297
CVE.ORG link : CVE-2020-9297
JSON object : View
Products Affected
netflix
- titus
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')