First published: Mon May 04 2020(Updated: )
A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Syncope | >=2.1.0<2.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1959 is a Server-Side Template Injection vulnerability identified in Apache Syncope prior to version 2.1.6. It allows attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE).
CVE-2020-1959 has a severity rating of critical with a CVSS score of 9.8 out of 10.
Apache Syncope versions prior to 2.1.6 are affected by CVE-2020-1959.
To fix CVE-2020-1959, it is recommended to update Apache Syncope to version 2.1.6 or higher.
More information about CVE-2020-1959 can be found on the Apache Syncope website at http://syncope.apache.org/security.