Possible expression language (EL) injection detected

Description

Expression Language (EL) injection vulnerabilities occur when external input is used to construct EL statements without proper validation. This can result in the execution of malicious code.

Remediations

  • Do validate all external input or dynamic values before incorporating them into EL statements. This step is crucial to prevent EL injection attacks.

References

Associated CWE

OWASP Top 10

Configuration

To skip this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --skip-rule=java_lang_expression_language_injection

To run only this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --only-rule=java_lang_expression_language_injection