Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-45132

Опубликовано: 18 нояб. 2022
Источник: ubuntu
Приоритет: medium
CVSS3: 9.8

Описание

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

2023.01-2
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

not-affected

2023.01-2
trusty

ignored

end of standard support
upstream

released

2023.01-1
xenial

ignored

end of standard support

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

CVSS3: 9.8
debian
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, r ...

CVSS3: 9.8
github
около 3 лет назад

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

9.8 Critical

CVSS3