Files
CVEs-PoC/2011/CVE-2011-2730.md
T
2024-06-18 02:51:15 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2011-2730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2730)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka "Expression Language Injection."
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
#### Github
- https://github.com/20142995/pocsuite
- https://github.com/ARPSyndicate/cvemon
- https://github.com/superfish9/pt