Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1302

Опубликовано: 15 фев. 2025
Источник: redhat
CVSS3: 9.8
EPSS Высокий

Описание

Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. Note: This is caused by an incomplete fix for CVE-2024-21534.

A flaw was found in jsonpath-plus. This vulnerability allows remote code execution (RCE) via improper input sanitization, exploiting the unsafe default usage of eval='safe' mode.

Отчет

Red Hat's initial impact rating of critical has been downgraded to low. While the vulnerable code is technically still present within Red Hat products, there are no code paths in affected products which allow exploitation. As such, the impact to Red Hat products is low. Each of the products listed have multiple components where a fixed build could occur. This distinction does not matter for users as only one build needs fixed for the product. Additionally, in Red Hat OpenShift AI, jsonpath-plus is a dependency of a direct dependency and is never loaded, as the direct dependency's feature that requires jsonpath-plus is not used.

Меры по смягчению последствий

Red Hat Product Security recommends updating the vulnerable software to the latest version.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Serverlesskn-backstage-plugins-eventmesh-rhel8Not affected
Red Hat OpenShift AI (RHOAI)odh-dashboard-containerNot affected
Red Hat OpenShift AI (RHOAI)odh-operator-containerNot affected
Red Hat OpenShift Dev Spacesdevspaces/code-rhel8Fix deferred
Red Hat OpenShift Dev Spacesdevspaces/dashboard-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2345890jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization

EPSS

Процентиль: 99%
0.86146
Высокий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
11 месяцев назад

Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).

CVSS3: 9.8
github
11 месяцев назад

JSONPath Plus allows Remote Code Execution

EPSS

Процентиль: 99%
0.86146
Высокий

9.8 Critical

CVSS3