Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-13936

Опубликовано: 09 мар. 2021
Источник: redhat
CVSS3: 8.8
EPSS Средний

Описание

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.

A flaw was found in velocity. An attacker, able to modify Velocity templates, may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

OpenShift Container Platform (OCP) openshift-logging/elasticsearch6-rhel8 container does contain a vulnerable version of velocity. The references to the library only occur in the x-pack component which is an enterprise-only feature of Elasticsearch - hence it has been marked as wontfix as this time and may be fixed in a future release. Additionally the hive container only references velocity in the testutils of the code but the code still exists in the container, as such it has been given a Moderate impact.

  • Velocity as shipped with Red Hat Enterprise Linux 6 is not affected because it does not contain the vulnerable code.
  • Velocity as shipped with Red Hat Enterprise Linux 7 contains a vulnerable version, but it is used as a dependency for IdM/ipa, which does not use the vulnerable functionality. It has been marked as Moderate for this reason.
  • Although velocity shipped in Red Hat Enterprise Linux 8's pki-deps:10.6 for IdM/ipa is a vulnerable version, the vulnerable code is not used by pki. It has been marked as Low for this reason.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2velocityNot affected
Red Hat AMQ Broker 7velocityNot affected
Red Hat BPM Suite 6velocityOut of support scope
Red Hat CodeReady Studio 12velocityAffected
Red Hat Decision Manager 7velocityAffected
Red Hat Enterprise Linux 6velocityNot affected
Red Hat Enterprise Linux 7velocityOut of support scope
Red Hat Enterprise Linux 8pki-deps:10.6/velocityFix deferred
Red Hat JBoss A-MQ 6velocityOut of support scope
Red Hat JBoss BRMS 6velocityOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1937440velocity: arbitrary code execution when attacker is able to modify templates

EPSS

Процентиль: 95%
0.16401
Средний

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 5 лет назад

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.

CVSS3: 8.8
nvd
почти 5 лет назад

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.

CVSS3: 8.8
debian
почти 5 лет назад

An attacker that is able to modify Velocity templates may execute arbi ...

suse-cvrf
почти 5 лет назад

Security update for velocity

suse-cvrf
12 месяцев назад

Recommended update for Maven

EPSS

Процентиль: 95%
0.16401
Средний

8.8 High

CVSS3