Skip to content

Apache Tiles Vulnerable to XSS via EL Expression Injection

Moderate severity GitHub Reviewed Published May 2, 2022 to the GitHub Advisory Database • Updated Jan 23, 2024

Package

maven org.apache.tiles:tiles-core (Maven)

Affected versions

>= 2.1, < 2.1.2

Patched versions

2.1.2

Description

Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.

References

Published by the National Vulnerability Database Apr 9, 2009
Published to the GitHub Advisory Database May 2, 2022
Last updated Jan 23, 2024
Reviewed Jan 23, 2024

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(78th percentile)

Weaknesses

Improper Neutralization of Alternate XSS Syntax

The product does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax. Learn more on MITRE.

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed. Learn more on MITRE.

CVE ID

CVE-2009-1275

GHSA ID

GHSA-2c6q-rgvj-66rx

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.