Vulnerability Details CVE-2020-11002
dropwizard-validation before versions 2.0.3 and 1.3.21 has a remote code execution vulnerability. A server-side template injection was identified in the self-validating feature enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you are using a self-validating bean an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended. The changes introduced in Dropwizard 1.3.19 and 2.0.2 for CVE-2020-5245 unfortunately did not fix the underlying issue completely. The issue has been fixed in dropwizard-validation 1.3.21 and 2.0.3 or later. We strongly recommend upgrading to one of these versions.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.013
EPSS Ranking 78.6%
CVSS Severity
CVSS v3 Score 8.0
CVSS v2 Score 9.0
Products affected by CVE-2020-11002
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.10
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.10-1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.11
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.11-1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.12
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.13
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.14
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.5
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.6
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.7
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.8
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.0.9
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.1.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.1.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.1.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.1.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.2.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.2.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.3.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.3.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.4.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.4.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.4.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.4.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.4.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.5.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.5.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.6.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.6.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.6.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.7.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.7.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.8.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.8.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.8.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.8.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.8.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.8.5
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.9.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.9.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.9.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:0.9.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.5
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.6
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.7
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.8
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.0.9
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.5
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.6
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.7
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.1.8
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.5
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.6
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.7
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.8
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.2.9
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.10
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.11
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.12
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.13
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.14
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.15
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.16
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.17
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.18
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.19
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.2
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.20
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.3
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.4
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.5
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.6
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.7
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.8
-
cpe:2.3:a:dropwizard:dropwizard_validation:1.3.9
-
cpe:2.3:a:dropwizard:dropwizard_validation:2.0.0
-
cpe:2.3:a:dropwizard:dropwizard_validation:2.0.1
-
cpe:2.3:a:dropwizard:dropwizard_validation:2.0.2