GHSA-8jpx-m2wh-2v34

Suggest an improvement
Source
https://github.com/advisories/GHSA-8jpx-m2wh-2v34
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/04/GHSA-8jpx-m2wh-2v34/GHSA-8jpx-m2wh-2v34.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8jpx-m2wh-2v34
Aliases
Published
2020-04-10T18:42:20Z
Modified
2023-11-08T04:02:02.808384Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Remote Code Execution (RCE) vulnerability in dropwizard-validation
Details

Summary

A server-side template injection was identified in the self-validating (@SelfValidating) feature of dropwizard-validation enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.

If you're using a self-validating bean (via @SelfValidating), an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended.

The changes introduced in Dropwizard 1.3.19 and 2.0.2 (see GHSA-3mcp-9wr4-cjqf/CVE-2020-5245) unfortunately didn't fix the underlying issue completely.

Impact

This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary Java Expression Language (EL) expressions when using the self-validating feature (@SelfValidating, @SelfValidation) in dropwizard-validation.

Patches

The issue has been fixed in dropwizard-validation 1.3.21 and 2.0.3 or later. We strongly recommend upgrading to one of these versions.

The evaluation of EL expressions has been disabled by default now.

In order to use some interpolation in the violation messages added to ViolationCollector, it has to be explicitly allowed by setting SelfValidating#escapeExpressions() to false.

It is also recommended to use the addViolation methods supporting message parameters instead of EL expressions introduced in Dropwizard 1.3.21 and 2.0.3: * ViolationCollector#addViolation(String, Map<String, Object> * ViolationCollector#addViolation(String, String, Map<String, Object> * ViolationCollector#addViolation(String, String, Integer, Map<String, Object> * ViolationCollector#addViolation(String, String, String, Map<String, Object>

Workarounds

If you are not able to upgrade to one of the aforementioned versions of dropwizard-validation but still want to use the @SelfValidating feature, make sure to properly sanitize any message you're adding to the ViolationCollector in the method annotated with @SelfValidation.

Example:

@SelfValidation
public void validateFullName(ViolationCollector col) {
    if (fullName.contains("_")) {
        // Sanitize fullName variable by escaping relevant characters such as "$"
        col.addViolation("Full name contains invalid characters:  " + sanitizeJavaEl(fullName));
    }
}

See also: https://github.com/dropwizard/dropwizard/blob/v2.0.3/dropwizard-validation/src/main/java/io/dropwizard/validation/InterpolationHelper.java

References

  • https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf
  • https://github.com/dropwizard/dropwizard/pull/3208
  • https://github.com/dropwizard/dropwizard/pull/3209
  • https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext

For more information

If you have any questions or comments about this advisory: * Open an issue in dropwizard/dropwizard * Start a discussion on the dropwizard-dev mailing list

Security contact

If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our security policy:

https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-04-10T18:37:22Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-74"
    ]
}
References

Affected packages

Maven / io.dropwizard:dropwizard-validation

Package

Name
io.dropwizard:dropwizard-validation
View open source insights on deps.dev
Purl
pkg:maven/io.dropwizard/dropwizard-validation

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.21

Affected versions

0.*

0.7.0-rc1
0.7.0-rc2
0.7.0-rc3
0.7.0
0.7.1
0.8.0-rc1
0.8.0-rc2
0.8.0-rc3
0.8.0-rc4
0.8.0-rc5
0.8.0
0.8.1-rc2
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.9.0-rc1
0.9.0-rc2
0.9.0-rc3
0.9.0-rc4
0.9.0-rc5
0.9.0
0.9.1-rc1
0.9.1
0.9.2
0.9.3

1.*

1.0.0-rc1
1.0.0-rc2
1.0.0-rc3
1.0.0-rc4
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.1.0-rc1
1.1.0-rc2
1.1.0-rc3
1.1.0-rc4
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.2.0-rc1
1.2.0-rc2
1.2.0-rc3
1.2.0-rc4
1.2.0-rc5
1.2.0-rc6
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.3.0-rc1
1.3.0-rc2
1.3.0-rc3
1.3.0-rc4
1.3.0-rc5
1.3.0-rc6
1.3.0-rc7
1.3.0
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9
1.3.10
1.3.11
1.3.12
1.3.13
1.3.14
1.3.15
1.3.16
1.3.17
1.3.18
1.3.19
1.3.20

Maven / io.dropwizard:dropwizard-validation

Package

Name
io.dropwizard:dropwizard-validation
View open source insights on deps.dev
Purl
pkg:maven/io.dropwizard/dropwizard-validation

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.0.3

Affected versions

2.*

2.0.0
2.0.1
2.0.2