-
-
Notifications
You must be signed in to change notification settings - Fork 669
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Request to Add Expression Language Injection Vulnerability (e.g., SpEL inection) #1729
Comments
The question is, is it widespread enough to have special spotlight as separate requirement or it can be covered in some more abstract requirement. #1589 - after spliting up current 5.3.1, we will have quite many requirement for injection, sanitization, encoding and execution. If we add separate requirement for each technology or framework, maybe it's too much. |
I am going to drop this into V5 rework bucket because I think we need to consider all these issues together |
I propose adding this to 5.2.8:
Any objections @ImanSharaf ? |
If we want to do this, then we should merge other items such as SSTI with this one too? |
sanitizing SpEL looks like a very bad idea doomed to failure 😄 I am not sure SpeL injection should be mentioned here but more alongside shell command injection, JavaScript/PHP/Python |
@randomstuff do you have a suggested requirement to include it in? What is your suggested mitigation? |
Having read here I agree it sounds more like eval/dynamic code execution: |
Opened #2091 |
I'd like to propose the addition of Expression Language (EL) Injection to the ASVS standards, given its relevance and increasing occurrences in modern applications.
Expression Language (EL) Injection is a type of injection attack where an attacker can inject arbitrary code into an application's EL engine, potentially leading to remote code execution, information disclosure, or other malicious activities. Several frameworks use expression languages to bind data between views and back-end services. When not properly validated or sanitized, these bindings can become attack vectors.
Spring Expression Language (SpEL) Injection
Spring Framework, popular in the Java ecosystem, uses its Expression Language called Spring Expression Language (SpEL). An application using SpEL is vulnerable if it directly evaluates expressions from untrusted sources.
Considering the potential risks and the popularity of frameworks using expression languages, I believe it would be valuable to incorporate this vulnerability into the ASVS standards. This would provide guidance for organizations to ensure their applications are safeguarded against such attacks.
The text was updated successfully, but these errors were encountered: