Name | CVE-2020-10693 |
Description | A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 988946 |
Vulnerable and fixed packages
The table below lists information on source packages.
The information below is based on the following data on fixed versions.
Notes
[bookworm] - libhibernate-validator-java <ignored> (Minor issue)
[bullseye] - libhibernate-validator-java <no-dsa> (Minor issue)
[buster] - libhibernate-validator-java <not-affected> (EL support added in 5.x)
[stretch] - libhibernate-validator-java <not-affected> (EL support added in 5.x)
[jessie] - libhibernate-validator-java <not-affected> (EL support added in 5.x)
- libhibernate-validator4-java <not-affected> (EL support added in 5.x)
https://bugzilla.redhat.com/show_bug.cgi?id=1805501