Possible expression language (EL) injection detected
- Rule ID: java_lang_expression_language_injection
- Languages: java
- Source: expression_language_injection.yml
Using external input when building an expression language (EL) statement can lead to EL injection attacks and the evaluation of risky code.
✅ Always validate the source of external input or dynamic values before using them to construct EL statements
- CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
OWASP Top 10
To skip this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --skip-rule=java_lang_expression_language_injection
To run only this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --only-rule=java_lang_expression_language_injection
Ready to take the next step? Learn more about Bearer Cloud.