Логотип exploitDog
bind:CVE-2022-37767
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-37767

Количество 2

Количество 2

nvd логотип

CVE-2022-37767

больше 3 лет назад

Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-wxx5-w9jc-48wx

больше 3 лет назад

Pebble Templates protection mechanism bypass can lead to arbitrary code execution

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-37767

Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-wxx5-w9jc-48wx

Pebble Templates protection mechanism bypass can lead to arbitrary code execution

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу