Количество 5
Количество 5
CVE-2021-41269
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
CVE-2021-41269
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
GHSA-p9m8-27x8-rg87
Critical vulnerability found in cron-utils
BDU:2021-05588
Уязвимость Java-библиотеки для определения, анализа, проверки и переноса cron-элементов cron-utils, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
BDU:2021-05647
Уязвимость расширения ePolicy Orchestrator программного средства защиты конфиденциальных данных McAfee Data Loss Prevention, позволяющая нарушителю выполнить произвольный SQL-код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-41269 cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known. | CVSS3: 9.8 | 4% Низкий | около 4 лет назад | |
CVE-2021-41269 cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known. | CVSS3: 10 | 4% Низкий | около 4 лет назад | |
GHSA-p9m8-27x8-rg87 Critical vulnerability found in cron-utils | CVSS3: 10 | 4% Низкий | около 4 лет назад | |
BDU:2021-05588 Уязвимость Java-библиотеки для определения, анализа, проверки и переноса cron-элементов cron-utils, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код | CVSS3: 10 | 4% Низкий | около 4 лет назад | |
BDU:2021-05647 Уязвимость расширения ePolicy Orchestrator программного средства защиты конфиденциальных данных McAfee Data Loss Prevention, позволяющая нарушителю выполнить произвольный SQL-код | CVSS3: 8.4 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу