8.8
CVSSv3

CVE-2020-5245

Published: 24/02/2020 Updated: 12/05/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Dropwizard-Validation prior to 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dropwizard dropwizard validation

oracle blockchain platform

Github Repositories

CVE-2020-5245 Run mvn clean install to build your application Start application with java -jar target/dropwizard-10-SNAPSHOTjar server configyml To check that your application is running enter url localhost:8080 some error in pomxml plugins were not affected reproduce Reproduce curl localhost:8080/bookService/selfValidatingBeanParam?answer=${%27%27getClass

Bean Validation To Remote Code Execution In this blog post we will talk about a Java Specific bug that are often overlooked during pentest , which can give us a code execution if certain Conditions are met What is Bean and what is Validators On Spring: The Bean in java simply refers to the POJO classes or we can say , the classes which have member variable de