Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p9m8-27x8-rg87

Опубликовано: 15 нояб. 2021
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

Critical vulnerability found in cron-utils

Impact

A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected.

Patches

The issue was patched and a new version was released. Please upgrade to version 9.1.6.

Workarounds

There are no known workarounds up to this moment.

References

A description of the issue is provided in issue 461

For more information

If you have any questions or comments about this advisory:

Open an issue in the cron-utils Github repository

Пакеты

Наименование

com.cronutils:cron-utils

maven
Затронутые версииВерсия исправления

< 9.1.6

9.1.6

EPSS

Процентиль: 88%
0.03799
Низкий

10 Critical

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
redhat
около 4 лет назад

cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.

CVSS3: 10
nvd
около 4 лет назад

cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.

CVSS3: 10
fstec
около 4 лет назад

Уязвимость Java-библиотеки для определения, анализа, проверки и переноса cron-элементов cron-utils, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.4
fstec
больше 4 лет назад

Уязвимость расширения ePolicy Orchestrator программного средства защиты конфиденциальных данных McAfee Data Loss Prevention, позволяющая нарушителю выполнить произвольный SQL-код

EPSS

Процентиль: 88%
0.03799
Низкий

10 Critical

CVSS3

Дефекты

CWE-94