Possible expression language (EL) injection detected
- Rule ID: java_lang_expression_language_injection
- Languages: java
- Source: expression_language_injection.yml
Description
Expression Language (EL) injection vulnerabilities occur when external input is used to construct EL statements without proper validation. This can result in the execution of malicious code.
Remediations
- Do validate all external input or dynamic values before incorporating them into EL statements. This step is crucial to prevent EL injection attacks.
References
Associated CWE
OWASP Top 10
Configuration
To skip this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --skip-rule=java_lang_expression_language_injection
To run only this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --only-rule=java_lang_expression_language_injection