Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wjxx-hxfj-hfmh

Опубликовано: 19 нояб. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

EPSS

Процентиль: 89%
0.04707
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

CVSS3: 9.8
nvd
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

CVSS3: 9.8
debian
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, r ...

EPSS

Процентиль: 89%
0.04707
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94