Published: 24/02/2020 Updated: 12/05/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Dropwizard-Validation prior to 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dropwizard dropwizard validation

oracle blockchain platform

Github Repositories

CVE-2020-5245 Run mvn clean install to build your application Start application with java -jar target/dropwizard-10-SNAPSHOTjar server configyml To check that your application is running enter url localhost:8080 some error in pomxml plugins were not affected reproduce Reproduce curl localhost:8080/bookService/selfValidatingBeanParam?answer=${%27%27getClass