CVE-2008-6504: ParameterInterceptors bypass allows OGNL statement execution
(updated )
ParametersInterceptor
does not properly restrict #
(pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023
representation for the #
character.
References
Detect and mitigate CVE-2008-6504 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →