You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi!
I am a staff member of QiAnXin Code Guard. In our open source code detection project, I found a OGNL Expression Injection Vulnerability in "billow". The details are as follows:
In the handleComplexSQS(), the parameters in the request are obtained by getQuery(params),
and finally the listQueuesFromQueryExpression() is passed in, followed by:
Parsing the argument as an OGNL expression!
An attacker can construct an OGNL expression for RCE
The text was updated successfully, but these errors were encountered:
Hi!
I am a staff member of QiAnXin Code Guard. In our open source code detection project, I found a OGNL Expression Injection Vulnerability in "billow". The details are as follows:
In the handleComplexSQS(), the parameters in the request are obtained by getQuery(params),
and finally the listQueuesFromQueryExpression() is passed in, followed by:
Parsing the argument as an OGNL expression!
An attacker can construct an OGNL expression for RCE
The text was updated successfully, but these errors were encountered: