Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.syncope/syncope-core
  4. ›
  5. CVE-2020-1959

CVE-2020-1959: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

June 16, 2021 (updated July 29, 2021)

A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.

References

  • github.com/advisories/GHSA-vjqw-r3ww-wj2w
  • nvd.nist.gov/vuln/detail/CVE-2020-1959

Code Behaviors & Features

Detect and mitigate CVE-2020-1959 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.1.6

Fixed versions

  • 2.1.6

Solution

Upgrade to version 2.1.6 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

Source file

maven/org.apache.syncope/syncope-core/CVE-2020-1959.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:38 +0000.