moqui / moqui-framework

Use Moqui Framework to build enterprise applications based on Java. It includes tools for databases (relational, graph, document), local and web services, web and other UI with screens and forms, security, file/resource access, scripts, templates, l10n, caching, logging, search, rules, workflow, multi-instance, and integration.
http://www.moqui.org
Other
284 stars 204 forks source link

CVE-2020-26238 (High) detected in cron-utils-9.1.1.jar #452

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2020-26238 - High Severity Vulnerability

Vulnerable Library - cron-utils-9.1.1.jar

A Java library to parse, migrate and validate crons as well as describe them in human readable language

Library home page: http://cron-parser.com/

Path to dependency file: moqui-framework/framework/build.gradle

Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/com.cronutils/cron-utils/9.1.1/d4f4df310183ccc7efdd3e18f6d0a62abe1184b6/cron-utils-9.1.1.jar

Dependency Hierarchy: - :x: **cron-utils-9.1.1.jar** (Vulnerable Library)

Vulnerability Details

Cron-utils is a Java library to parse, validate, migrate crons as well as get human readable descriptions for them. In cron-utils before version 9.1.3, a template Injection vulnerability is present. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected. This issue was patched in version 9.1.3.

Publish Date: 2020-11-25

URL: CVE-2020-26238

CVSS 3 Score Details (7.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5

Release Date: 2020-11-25

Fix Resolution: com.cronutils:cron-utils:9.1.3


Step up your Open Source Security Game with WhiteSource here

jonesde commented 3 years ago

Updated in commit e8e921f9