Vulnerability Name: | CVE-2020-5245 (CCN-176984) | ||||||||||||
Assigned: | 2020-02-24 | ||||||||||||
Published: | 2020-02-24 | ||||||||||||
Updated: | 2022-05-12 | ||||||||||||
Summary: | Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-74 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-5245 Source: MISC Type: Third Party Advisory https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation Source: MISC Type: Third Party Advisory https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions Source: MISC Type: Third Party Advisory https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm Source: XF Type: UNKNOWN dropwizard-cve20205245-code-exec(176984) Source: MISC Type: Patch, Third Party Advisory https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634 Source: MISC Type: Patch, Third Party Advisory https://github.com/dropwizard/dropwizard/pull/3157 Source: MISC Type: Patch, Third Party Advisory https://github.com/dropwizard/dropwizard/pull/3160 Source: CCN Type: Dropwizard GIT Repository Remote Code Execution (RCE) vulnerability in dropwizard-validation <2.0.2 Source: CONFIRM Type: Exploit, Third Party Advisory https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf Source: CCN Type: IBM Security Bulletin 6606205 (Tivoli Netcool Manager) There are multiple security vulnerabilities in Apache Storm used by IBM Tivoli Netcool Manager. Source: CCN Type: Oracle CPUApr2022 Oracle Critical Patch Update Advisory - April 2022 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-5245 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
BACK |