Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q857-vpgq-596j

Опубликовано: 10 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7

Описание

A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure.

The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+

  • 6.11.1+

 Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .

A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure.

The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+

  • 6.11.1+

 Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .

EPSS

Процентиль: 66%
0.00522
Низкий

8.7 High

CVSS4

Дефекты

CWE-502

Связанные уязвимости

nvd
около 2 месяцев назад

A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+  Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .

EPSS

Процентиль: 66%
0.00522
Низкий

8.7 High

CVSS4

Дефекты

CWE-502