CVE-2020-10693

NameCVE-2020-10693
DescriptionA flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs988946

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libhibernate-validator-java (PTS)jessie4.0.2.GA-8fixed
stretch4.3.3-1+deb9u1fixed
buster4.3.4-1fixed
bullseye5.3.6-1vulnerable
bookworm5.3.6-2vulnerable
sid, trixie5.3.6-3vulnerable
libhibernate-validator4-java (PTS)bullseye4.3.4-4fixed
sid, trixie, bookworm4.3.4-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libhibernate-validator-javasourcewheezy(unfixed)end-of-life
libhibernate-validator-javasourcejessie(not affected)
libhibernate-validator-javasourcestretch(not affected)
libhibernate-validator-javasourcebuster(not affected)
libhibernate-validator-javasource(unstable)(unfixed)988946
libhibernate-validator4-javasource(unstable)(not affected)

Notes

[bookworm] - libhibernate-validator-java <ignored> (Minor issue)
[bullseye] - libhibernate-validator-java <no-dsa> (Minor issue)
[buster] - libhibernate-validator-java <not-affected> (EL support added in 5.x)
[stretch] - libhibernate-validator-java <not-affected> (EL support added in 5.x)
[jessie] - libhibernate-validator-java <not-affected> (EL support added in 5.x)
- libhibernate-validator4-java <not-affected> (EL support added in 5.x)
https://bugzilla.redhat.com/show_bug.cgi?id=1805501

Search for package or bug name: Reporting problems