CVE-2023-50571: easy-rules-mvel vulnerable to remote code execution
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.70468%
CWE
-
Published
12/29/2023
Updated
1/5/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jeasy:easy-rules-mvel | maven | = 4.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in methods that process
MVEL expressions. Both when()
and then()
methods accept arbitrary MVEL expressions which are evaluated without proper security controls. MVEL's ability to directly reference and instantiate classes allows attackers to trigger static initialization blocks (as demonstrated with jaz.Zer
class). The reproduction examples in GHSA-fgwc-3j6w-ch22
explicitly show RCE achieved through these methods, confirming their role in the vulnerability chain.