Vulnerability Name:

CVE-2020-5245 (CCN-176984)

Assigned:2020-02-24
Published:2020-02-24
Updated:2022-05-12
Summary:Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-74
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2020-5245

Source: MISC
Type: Third Party Advisory
https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation

Source: MISC
Type: Third Party Advisory
https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions

Source: MISC
Type: Third Party Advisory
https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm

Source: XF
Type: UNKNOWN
dropwizard-cve20205245-code-exec(176984)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/dropwizard/dropwizard/pull/3157

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/dropwizard/dropwizard/pull/3160

Source: CCN
Type: Dropwizard GIT Repository
Remote Code Execution (RCE) vulnerability in dropwizard-validation <2.0.2

Source: CONFIRM
Type: Exploit, Third Party Advisory
https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf

Source: CCN
Type: IBM Security Bulletin 6606205 (Tivoli Netcool Manager)
There are multiple security vulnerabilities in Apache Storm used by IBM Tivoli Netcool Manager.

Source: CCN
Type: Oracle CPUApr2022
Oracle Critical Patch Update Advisory - April 2022

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2020-5245

Vulnerable Configuration:Configuration 1:
  • cpe:/a:dropwizard:dropwizard_validation:*:*:*:*:*:*:*:* (Version < 1.3.19)
  • OR cpe:/a:dropwizard:dropwizard_validation:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 2.0.2)

  • Configuration 2:
  • cpe:/a:oracle:blockchain_platform:*:*:*:*:*:*:*:* (Version < 21.1.2)

  • * Denotes that component is vulnerable
    BACK
    dropwizard dropwizard validation *
    dropwizard dropwizard validation *
    oracle blockchain platform *