PrimeFaces 4.0.x < 4.0.25 / 5.x < 5.2.21 / 5.3.x < 5.3.8 Expression Language Injection

critical Web App Scanning Plugin ID 113119

Synopsis

PrimeFaces 4.0.x < 4.0.25 / 5.x < 5.2.21 / 5.3.x < 5.3.8 Expression Language Injection

Description

In affected versions of PrimeFaces, an expression language injection vulnerability exists that would allow an unauthenticated user to execute arbitrary code due to a weak encryption flaw.

Solution

Update your Primefaces installation to 4.0.25, 5.2.21, 5.3.8 or later.

See Also

https://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html

https://www.primefaces.org/primefaces-el-injection-update/

Plugin Details

Severity: Critical

ID: 113119

Type: remote

Published: 1/19/2022

Updated: 1/19/2022

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-1000486

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2017-1000486

Vulnerability Information

CPE: cpe:2.3:a:primetek:primefaces:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

CISA Known Exploited Vulnerability Due Dates: 7/10/2022

Reference Information

CVE: CVE-2017-1000486