CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
de.tum.in.ase: artemis-java-test-sandbox is vulnerable to Arbitrary Code Execution. The vulnerability is due to missing class sanitization during the creation of special subclasses of type InvocationTargetException
. An attacker can execute arbitrary student code in the trusted context.
github.com/advisories/GHSA-883x-6fch-6wjx
github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392
github.com/ls1intum/Ares/issues/15#issuecomment-996449371
github.com/ls1intum/Ares/releases/tag/1.7.6
github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx
vulncheck.com/advisories/vc-advisory-GHSA-883x-6fch-6wjx