Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-45132

Опубликовано: 18 нояб. 2022
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:linaro:lava:*:*:*:*:*:*:*:*
Версия до 2022.11.1 (исключая)

EPSS

Процентиль: 89%
0.04707
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94
CWE-94

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

CVSS3: 9.8
debian
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, r ...

CVSS3: 9.8
github
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

EPSS

Процентиль: 89%
0.04707
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94
CWE-94