Описание
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
A flaw was found in cron-utils. This flaw allows an attacker to perform unauthenticated Remote Code Execution (RCE) via Java Expression Language (EL) injection.
Отчет
Only projects using the @Cron annotation to validate untrusted Cron expressions are affected.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat build of Quarkus | cron-utils | Affected | ||
| Red Hat Integration Camel K 1 | cron-utils | Not affected | ||
| Red Hat build of Quarkus 2.2.5 | cron-utils | Fixed | RHSA-2022:0589 | 21.02.2022 |
| RHINT Camel-Q 2.2.1 | cron-utils | Fixed | RHSA-2022:1013 | 22.03.2022 |
| RHINT Service Registry 2.3.0 GA | cron-utils | Fixed | RHSA-2022:6835 | 06.10.2022 |
Показывать по
Дополнительная информация
Статус:
9.8 Critical
CVSS3
Связанные уязвимости
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
Уязвимость Java-библиотеки для определения, анализа, проверки и переноса cron-элементов cron-utils, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
Уязвимость расширения ePolicy Orchestrator программного средства защиты конфиденциальных данных McAfee Data Loss Prevention, позволяющая нарушителю выполнить произвольный SQL-код
9.8 Critical
CVSS3