← Back to CVEs
CVE-2022-37767
CRITICAL9.8
Description
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/12/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
pebbletemplates:pebble_templates
Weaknesses (CWE)
CWE-863
References
https://github.com/Y4tacker/Web-Security/issues/3(cve@mitre.org)
https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/Y4tacker/Web-Security/issues/3(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.