Логотип exploitDog
bind:CVE-2024-28848
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-28848

Количество 3

Количество 3

nvd логотип

CVE-2024-28848

почти 2 года назад

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `‎CompiledRule::validateExpression` method evaluates an SpEL expression using an `StandardEvaluationContext`, allowing the expression to reach and interact with Java classes such as `java.lang.Runtime`, leading to Remote Code Execution. The `/api/v1/policies/validation/condition/<expression>` endpoint passes user-controlled data `CompiledRule::validateExpession` allowing authenticated (non-admin) users to execute arbitrary system commands on the underlaying operating system. In addition, there is a missing authorization check since `Authorizer.authorize()` is never called in the affected path and therefore any authenticated non-admin user is able to trigger this endpoint and evaluate arbitrary SpEL expressions leading to arbitrary command execution. This vulnerability was discovered with the help of CodeQL's E

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-5xv3-fm7g-865r

почти 2 года назад

OpenMetadata vulnerable to a SpEL Injection in `GET /api/v1/policies/validation/condition/<expr>` (`GHSL-2023-236`)

CVSS3: 8.8
EPSS: Высокий
fstec логотип

BDU:2024-03259

почти 2 года назад

Уязвимость метода ‎CompiledRule::validateExpression (/api/v1/policies/validation/condition/) платформы для управления метаданными OpenMetadata, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-28848

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `‎CompiledRule::validateExpression` method evaluates an SpEL expression using an `StandardEvaluationContext`, allowing the expression to reach and interact with Java classes such as `java.lang.Runtime`, leading to Remote Code Execution. The `/api/v1/policies/validation/condition/<expression>` endpoint passes user-controlled data `CompiledRule::validateExpession` allowing authenticated (non-admin) users to execute arbitrary system commands on the underlaying operating system. In addition, there is a missing authorization check since `Authorizer.authorize()` is never called in the affected path and therefore any authenticated non-admin user is able to trigger this endpoint and evaluate arbitrary SpEL expressions leading to arbitrary command execution. This vulnerability was discovered with the help of CodeQL's E

CVSS3: 8.8
76%
Высокий
почти 2 года назад
github логотип
GHSA-5xv3-fm7g-865r

OpenMetadata vulnerable to a SpEL Injection in `GET /api/v1/policies/validation/condition/<expr>` (`GHSL-2023-236`)

CVSS3: 8.8
76%
Высокий
почти 2 года назад
fstec логотип
BDU:2024-03259

Уязвимость метода ‎CompiledRule::validateExpression (/api/v1/policies/validation/condition/) платформы для управления метаданными OpenMetadata, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
76%
Высокий
почти 2 года назад

Уязвимостей на страницу