Use Moqui Framework to build enterprise applications based on Java. It includes tools for databases (relational, graph, document), local and web services, web and other UI with screens and forms, security, file/resource access, scripts, templates, l10n, caching, logging, search, rules, workflow, multi-instance, and integration.
Path to dependency file: moqui-framework/framework/build.gradle
Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/com.cronutils/cron-utils/9.1.1/d4f4df310183ccc7efdd3e18f6d0a62abe1184b6/cron-utils-9.1.1.jar
Cron-utils is a Java library to parse, validate, migrate crons as well as get human readable descriptions for them. In cron-utils before version 9.1.3, a template Injection vulnerability is present. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected. This issue was patched in version 9.1.3.
CVE-2020-26238 - High Severity Vulnerability
Vulnerable Library - cron-utils-9.1.1.jar
A Java library to parse, migrate and validate crons as well as describe them in human readable language
Library home page: http://cron-parser.com/
Path to dependency file: moqui-framework/framework/build.gradle
Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/com.cronutils/cron-utils/9.1.1/d4f4df310183ccc7efdd3e18f6d0a62abe1184b6/cron-utils-9.1.1.jar
Dependency Hierarchy: - :x: **cron-utils-9.1.1.jar** (Vulnerable Library)
Vulnerability Details
Cron-utils is a Java library to parse, validate, migrate crons as well as get human readable descriptions for them. In cron-utils before version 9.1.3, a template Injection vulnerability is present. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected. This issue was patched in version 9.1.3.
Publish Date: 2020-11-25
URL: CVE-2020-26238
CVSS 3 Score Details (7.9)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5
Release Date: 2020-11-25
Fix Resolution: com.cronutils:cron-utils:9.1.3
Step up your Open Source Security Game with WhiteSource here