Expression Language Injection Affecting org.apache.tiles:tiles-core package, versions [2.1.0,2.1.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.51% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Expression Language Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHETILES-6186451
  • published25 Jan 2024
  • disclosed2 May 2022
  • creditAntonio Petrelli

Introduced: 2 May 2022

CVE-2009-1275  (opens in a new tab)
CWE-917  (opens in a new tab)

How to fix?

Upgrade org.apache.tiles:tiles-core to version 2.1.2 or higher.

Overview

Affected versions of this package are vulnerable to Expression Language Injection due to Expression Language (EL) expressions being evaluated twice under certain conditions. An attacker can inject malicious scripts or access sensitive information through the tiles:putAttribute or tiles:insertTemplate JSP tags. If at the first evaluation the EL expression is connected to a user-entered content, it could be maliciously exploited to access the server context.

CVSS Scores

version 3.1