← Zuruck zu CVEs
CVE-2022-37767
CRITICAL9.8
Beschreibung
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht9/12/2022
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
pebbletemplates:pebble_templates
Schwachen (CWE)
CWE-863
Referenzen
https://github.com/Y4tacker/Web-Security/issues/3(cve@mitre.org)
https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/Y4tacker/Web-Security/issues/3(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.