2024-12-08 03:06:42 +00:00

98 lines
3.2 KiB
JSON

{
"id": "CVE-2022-45132",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-18T23:15:29.637",
"lastModified": "2024-11-21T07:28:49.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server."
},
{
"lang": "es",
"value": "En Linaro Automated Validation Architecture (LAVA) anterior a 2022.11.1, la ejecuci\u00f3n remota de c\u00f3digo se puede lograr a trav\u00e9s de la plantilla Jinja2 enviada por el usuario. El endpoint de la API REST para validar archivos de configuraci\u00f3n de dispositivos en el servidor lava carga la entrada como una plantilla Jinja2 de una manera que puede usarse para activar la ejecuci\u00f3n remota de c\u00f3digo en el servidor LAVA."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linaro:lava:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2022.11.1",
"matchCriteriaId": "CA62C7AE-55F3-4880-8286-3737E25742EB"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.lavasoftware.org/archives/list/lava-announce%40lists.lavasoftware.org/thread/WHXGQMIZAPW3GCQEXYHC32N2ZAAAIYCY/",
"source": "cve@mitre.org"
},
{
"url": "https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.lavasoftware.org/archives/list/lava-announce%40lists.lavasoftware.org/thread/WHXGQMIZAPW3GCQEXYHC32N2ZAAAIYCY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}