DEBIAN-CVE-2020-10693

Source
https://security-tracker.debian.org/tracker/CVE-2020-10693
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-10693.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-10693
Upstream
Published
2020-05-06T14:15:10Z
Modified
2025-09-18T05:18:47Z
Summary
[none]
Details

A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.

References

Affected packages

Debian:11

libhibernate-validator-java

Package

Name
libhibernate-validator-java
Purl
pkg:deb/debian/libhibernate-validator-java?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12

libhibernate-validator-java

Package

Name
libhibernate-validator-java
Purl
pkg:deb/debian/libhibernate-validator-java?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13

libhibernate-validator-java

Package

Name
libhibernate-validator-java
Purl
pkg:deb/debian/libhibernate-validator-java?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14

libhibernate-validator-java

Package

Name
libhibernate-validator-java
Purl
pkg:deb/debian/libhibernate-validator-java?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "not yet assigned"
}