Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-26238
HistoryNov 24, 2020 - 11:50 p.m.

CVE-2020-26238 Critical vulnerability found in cron-utils

2020-11-2423:50:12
CWE-74
GitHub_M
www.cve.org
1

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

8.4 High

AI Score

Confidence

High

0.199 Low

EPSS

Percentile

96.4%

Cron-utils is a Java library to parse, validate, migrate crons as well as get human readable descriptions for them. In cron-utils before version 9.1.3, a template Injection vulnerability is present. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected. This issue was patched in version 9.1.3.

CNA Affected

[
  {
    "product": "cron-utils",
    "vendor": "jmrozanec",
    "versions": [
      {
        "status": "affected",
        "version": "< 9.1.3"
      }
    ]
  }
]

References

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

8.4 High

AI Score

Confidence

High

0.199 Low

EPSS

Percentile

96.4%

Related for CVELIST:CVE-2020-26238