Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-41269
HistoryNov 15, 2021 - 8:30 p.m.

CVE-2021-41269 Unauthenticated remote code injection in cron-utils

2021-11-1520:30:14
CWE-94
GitHub_M
www.cve.org
5
cve-2021-41269
unauthenticated remote code injection
cron-utils
java library
template injection
arbitrary java el expressions
remote code execution
vulnerability
@cron annotation
patch
version 9.1.6

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.03

Percentile

91.1%

cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.

CNA Affected

[
  {
    "product": "cron-utils",
    "vendor": "jmrozanec",
    "versions": [
      {
        "status": "affected",
        "version": "< 9.1.6"
      }
    ]
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.03

Percentile

91.1%

Related for CVELIST:CVE-2021-41269