Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expression_Language_Injection_OGNL @ OGNLExpressionInjectionController.java #21

Closed
AaronZhouYu opened this issue Feb 7, 2023 · 0 comments

Comments

@AaronZhouYu
Copy link
Owner

Expression_Language_Injection_OGNL issue exists @ OGNLExpressionInjectionController.java in branch main

The user input provided in expression in expression at line 26 is inserted into a string, which is evaluated as an expression language statment by getValue in /src/main/java/org/t246osslab/easybuggy4sb/vulnerabilities/OGNLExpressionInjectionController.java at line 40 without being sanitized, resulting in execution of expression language code from a potentially untrusted source.

This may result in execution of an OGNL expression.

Namespace: AaronZhouYu
Repository: TotallySecureApp
Repository Url: https://github.com/AaronZhouYu/TotallySecureApp
CxAST-Project: AaronZhouYu/TotallySecureApp
CxAST platform scan: 044c3806-8e67-4c10-99a5-5e39d680a811
Branch: main
Application: TotallySecureApp
Severity: HIGH
State: TO_VERIFY
Status: RECURRENT
CWE: 917
Lines: 26


References
Read more

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant