Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42902

Опубликовано: 13 окт. 2022
Источник: debian
EPSS Низкий

Описание

In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lavafixed2022.10-1package

Примечания

  • https://git.lavasoftware.org/lava/lava/-/merge_requests/1834

  • https://git.lavasoftware.org/lava/lava/-/commit/e66b74cd6c175ff8826b8f3431740963be228b52?merge_request_iid=1834

EPSS

Процентиль: 83%
0.01871
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.

CVSS3: 8.8
nvd
больше 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.

CVSS3: 8.8
github
больше 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.

EPSS

Процентиль: 83%
0.01871
Низкий