Description
Netflix Titus uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
Remediation
References
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md
Related Vulnerabilities
CVE-2017-5646 Vulnerability in maven package org.apache.knox:gateway
CVE-2020-1697 Vulnerability in maven package org.keycloak:keycloak-server-spi-private
CVE-2022-45395 Vulnerability in maven package com.thalesgroup.jenkins-ci.plugins:cccc
CVE-2015-9286 Vulnerability in npm package nodebb
CVE-2022-2216 Vulnerability in maven package org.webjars.npm:parse-url