Lucene search

K
zdiBrandon Perry, Justin Kennedy and Steven Seeley of Source InciteZDI-21-1329
HistoryNov 22, 2021 - 12:00 a.m.

Commvault CommCell DataProvider JavaScript Sandbox Escape Vulnerability

2021-11-2200:00:00
Brandon Perry, Justin Kennedy and Steven Seeley of Source Incite
www.zerodayinitiative.com
21
commvault commcell
dataprovider
javascript
sandbox escape
vulnerability
remote execution
authentication bypass
flaw
user-supplied string
validation
java code
network service

EPSS

0.017

Percentile

87.9%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the DataProvider class. The issue results from the lack of proper validation of a user-supplied string before executing it as JavaScript code. An attacker can leverage this vulnerability to escape the JavaScript sandbox and execute Java code in the context of NETWORK SERVICE.

EPSS

0.017

Percentile

87.9%

Related for ZDI-21-1329