Lucene search

K
githubGitHub Advisory DatabaseGHSA-3R28-RGP9-QGV4
HistoryAug 29, 2023 - 12:32 a.m.

pf4j vulnerable to remote code execution via the zippluginPath parameter

2023-08-2900:32:04
CWE-22
CWE-94
GitHub Advisory Database
github.com
10
pf4j
vulnerability
remote code execution
sensitive information
arbitrary code

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.003

Percentile

68.3%

An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.

Affected configurations

Vulners
Node
org.pf4jpf4jRange3.9.0
VendorProductVersionCPE
org.pf4jpf4j*cpe:2.3:a:org.pf4j:pf4j:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.003

Percentile

68.3%