Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q5j9-f95w-f4pr

Опубликовано: 05 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.8

Описание

TERASOLUNA Server Framework vulnerable to ClassLoader manipulation

TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to ClassLoader manipulation due to using the old version of Spring Framework which contains the vulnerability. The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application.

When using TERASOLUNA Global Framework 1.0.0 (Public review version), update to TERASOLUNA Server Framework for Java 5.7.1.SP1 (using Spring Framework 5.3.18). This vulnerability alone can be addressed by updating to TERASOLUNA Global Framework 1.0.1 (using Spring Framework 3.2.10) or later.

Пакеты

Наименование

org.terasoluna.gfw:terasoluna-gfw-common

maven
Затронутые версииВерсия исправления

< 1.0.1.RELEASE

1.0.1.RELEASE

EPSS

Процентиль: 37%
0.00163
Низкий

7.8 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.8
nvd
около 3 лет назад

TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to a ClassLoader manipulation vulnerability due to using the old version of Spring Framework which contains the vulnerability.The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application.

EPSS

Процентиль: 37%
0.00163
Низкий

7.8 High

CVSS3

Дефекты

CWE-20