In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Link | Tags |
---|---|
https://github.com/eclipse-ee4j/el-ri/issues/155 | issue tracking exploit third party advisory |
https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/ | third party advisory exploit |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |