Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-28847

Опубликовано: 15 мар. 2024
Источник: nvd
CVSS3: 8.8
EPSS Средний

Описание

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. Similarly to the GHSL-2023-250 issue, AlertUtil::validateExpression is also called from EventSubscriptionRepository.prepare(), which can lead to Remote Code Execution. prepare() is called from EntityRepository.prepareInternal() which, in turn, gets called from EntityResource.createOrUpdate(). Note that, even though there is an authorization check (authorizer.authorize()), it gets called after prepareInternal() gets called and, therefore, after the SpEL expression has been evaluated. In order to reach this method, an attacker can send a PUT request to /api/v1/events/subscriptions which gets handled by EventSubscriptionResource.createOrUpdateEventSubscription(). This vulnerability was discovered with the help of CodeQL's Expression language injection (Spring) query. This issue may lead to Remote Code

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:open-metadata:openmetadata:*:*:*:*:*:*:*:*
Версия до 1.2.4 (исключая)

EPSS

Процентиль: 95%
0.19291
Средний

8.8 High

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 8.8
github
почти 2 года назад

OpenMetadata vulnerable to a SpEL Injection in `PUT /api/v1/events/subscriptions` (`GHSL-2023-251`)

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость метода ‎AlertUtil::validateExpression (/api/v1/events/subscriptions) платформы для управления метаданными OpenMetadata, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.19291
Средний

8.8 High

CVSS3

Дефекты

CWE-94