Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-29485

Опубликовано: 29 июн. 2021
Источник: nvd
CVSS3: 9.9
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If one's application does not use Ratpack's session mechanism, it is not vulnerable. Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. Two possible workarounds exist. The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of SessionSerializer that uses an allow-list.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:ratpack_project:ratpack:*:*:*:*:*:*:*:*
Версия до 1.9.0 (исключая)

EPSS

Процентиль: 85%
0.02483
Низкий

9.9 Critical

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502
CWE-502

Связанные уязвимости

CVSS3: 9.9
github
больше 4 лет назад

Remote Code Execution Vulnerability in Session Storage

EPSS

Процентиль: 85%
0.02483
Низкий

9.9 Critical

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502
CWE-502