It was reported [1],[2] that Apache MyFaces 2 would re-evaluate param/model values as EL expressions under certain conditions. If a submit outcome included both faces-redirect=true and includeViewParams=true (or faces-include-view-params=true), it would be possible to inject EL expressions directly into input fields mapped as view parameters. This is fixed in upstream versions 2.0.11 and 2.1.5. A patch [3] and reproducer [4] are available. [1] http://java.net/jira/browse/JAVASERVERFACES-2247 [2] https://issues.apache.org/jira/browse/MYFACES-3405 [3] https://issues.apache.org/jira/secure/attachment/12504807/MYFACES-3405-1.patch [4] http://www.jakobk.com/2011/11/jsf-value-expression-injection-vulnerability/
Statement: Not vulnerable. This issue affects the MyFaces 2 package, which is not shipped with any Red Hat products.
*** Bug 757982 has been marked as a duplicate of this bug. ***