Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-28253

Опубликовано: 15 мар. 2024
Источник: nvd
CVSS3: 9.4
CVSS3: 8.8
EPSS Критический

Описание

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. CompiledRule::validateExpression is also called from PolicyRepository.prepare. prepare() is called from EntityRepository.prepareInternal() which, in turn, gets called from EntityResource.createOrUpdate(). Note that even though there is an authorization check (authorizer.authorize()), it gets called after prepareInternal() gets called and therefore after the SpEL expression has been evaluated. In order to reach this method, an attacker can send a PUT request to /api/v1/policies which gets handled by PolicyResource.createOrUpdate(). This vulnerability was discovered with the help of CodeQL's Expression language injection (Spring) query and is also tracked as GHSL-2023-252. This issue may lead to Remote Code Execution and has been addressed in version 1.3.1. Users are advised to upgrade. There are n

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:open-metadata:openmetadata:*:*:*:*:*:*:*:*
Версия до 1.3.1 (исключая)

EPSS

Процентиль: 100%
0.9256
Критический

9.4 Critical

CVSS3

8.8 High

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.4
github
почти 2 года назад

OpenMetadata vulnerable to SpEL Injection in `PUT /api/v1/policies` (`GHSL-2023-252`)

CVSS3: 9.4
fstec
почти 2 года назад

Уязвимость платформы для управления метаданными OpenMetadata, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.9256
Критический

9.4 Critical

CVSS3

8.8 High

CVSS3

Дефекты

CWE-94