Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6rh6-x8ww-9h97

Опубликовано: 21 июл. 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Grails framework Remote Code Execution via Data Binding

Impact

A vulnerability has been discovered in the Grails data-binding logic which allows for Remote Code Execution in a Grails application. This exploit requires the application to be running on Java 8, either deployed as a WAR to a servlet container, or an executable JAR.

Patches

Grails framework versions 5.2.1, 5.1.9, 4.1.1, and 3.3.15

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35912 https://grails.org/blog/2022-07-18-rce-vulnerability.html

For more information

If you have any questions or comments about this advisory:

Credit

This vulnerability was discovered by meizjm3i and codeplutos of AntGroup FG Security Lab

Пакеты

Наименование

org.grails:grails-databinding

maven
Затронутые версииВерсия исправления

>= 3.3.10, < 3.3.15

3.3.15

Наименование

org.grails:grails-databinding

maven
Затронутые версииВерсия исправления

>= 4.0.0, < 4.1.1

4.1.1

Наименование

org.grails:grails-databinding

maven
Затронутые версииВерсия исправления

>= 5.0.0, < 5.1.9

5.1.9

Наименование

org.grails:grails-databinding

maven
Затронутые версииВерсия исправления

= 5.2.0

5.2.1

EPSS

Процентиль: 89%
0.04713
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 3 лет назад

In grails-databinding in Grails before 3.3.15, 4.x before 4.1.1, 5.x before 5.1.9, and 5.2.x before 5.2.1 (at least when certain Java 8 configurations are used), data binding allows a remote attacker to execute code by gaining access to the class loader.

CVSS3: 9.8
debian
больше 3 лет назад

In grails-databinding in Grails before 3.3.15, 4.x before 4.1.1, 5.x b ...

EPSS

Процентиль: 89%
0.04713
Низкий

9.8 Critical

CVSS3