Possible expression language (EL) injection detected

Overview

  • Rule ID: java_lang_expression_language_injection

  • Applicable Languages: Java

  • Weakness ID: CWE-917

Description

Expression Language (EL) injection vulnerabilities arise when unvalidated external input is incorporated into EL statements. This can lead to the inadvertent execution of malicious code.

Remediation Guidelines

  • Always validate all external input or dynamic values before incorporating them into EL statements. This is essential to mitigate the risk of EL injection attacks.

References

Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL

Last updated