Category: Database, Security

Security researchers at Citadelorevealed an EL (Expression Language) based Injection vulnerability that enabled an authenticated actor to send a malicious payload (via API calls or intercepted Web request) that led to In this blog I will aim to deconstruct this zero-day (CVE-2020–3956) identified and their disclosure, and what lessons can be learned. Tomas Melicher, and Lukas Vaclavik from Citadelo identified this vulnerability in VMware Cloud Director during a penetration test and reported it to the vendor. Once alert to the situation, VMware created a security advisory for this vulnerability and released new versions of the product with an implemented fix for this vulnerability.

Using this graph language, can we ask the following questions to preemptively determine if any code base is susceptible to such an Expression Language based vulnerability?

Related Articles