82 lines
2.5 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-22533",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T03:15:11.210",
"lastModified": "2024-02-10T04:09:13.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Beetl, antes de la versi\u00f3n 3.15.12, la plantilla de renderizado ten\u00eda una vulnerabilidad de inyecci\u00f3n de plantilla del lado del servidor (SSTI). Cuando la plantilla entrante sea controlable, ser\u00e1 filtrada por la lista negra de DefaultNativeSecurityManager. Debido a que el filtrado de listas negras no es estricto, se puede omitir la lista negra, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xiandafu:beetl:3.15.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1778AA33-B284-48F4-BADE-089C77D1D0FC"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/xiandafu/beetl/issues/I8RU01",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}