Expression Language Injection
Description
It is possible to execute arbitrary Expression Language (EL) statements on the target application server. EL injection is a critical severity vulnerability that can lead to full system compromise. EL injection can occur when attacker-controlled data is used to construct EL statements without neutralizing special characters. These special characters could modify the intended EL statement prior to it being executed by an interpreter.
Remediation
User-controlled data should always have special elements neutralized when used as part of constructing Expression Language statements. Please consult the documentation for the EL interpreter in use on how properly neutralize user controlled data.
Details
ID | Aggregated | CWE | Type | Risk |
---|---|---|---|---|
917.1 | false | 917 | Active | high |
Links
Docs
Edit this page to fix an error or add an improvement in a merge request.
Create an issue to suggest an improvement to this page.
Product
Create an issue if there's something you don't like about this feature.
Propose functionality by submitting a feature request.
Feature availability and product trials
View pricing to see all GitLab tiers and features, or to upgrade.
Try GitLab for free with access to all features for 30 days.
Get help
If you didn't find what you were looking for, search the docs.
If you want help with something specific and could use community support, post on the GitLab forum.
For problems setting up or using this feature (depending on your GitLab subscription).
Request support