Lucene search

K
githubGitHub Advisory DatabaseGHSA-RVM8-J2CP-J592
HistoryAug 29, 2023 - 12:32 a.m.

pf4j vulnerable to remote code execution via loadpluginPath parameter

2023-08-2900:32:04
CWE-22
CWE-94
GitHub Advisory Database
github.com
12
pf4j
vulnerability
loadpluginpath
remote code execution
sensitive information
arbitrary code
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.003

Percentile

70.0%

An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.

Affected configurations

Vulners
Node
org.pf4jpf4jRange3.9.0
VendorProductVersionCPE
org.pf4jpf4j*cpe:2.3:a:org.pf4j:pf4j:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.003

Percentile

70.0%