← Volver a CVEs
CVE-2022-37767
CRITICAL9.8
Descripcion
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado9/12/2022
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
pebbletemplates:pebble_templates
Debilidades (CWE)
CWE-863
Referencias
https://github.com/Y4tacker/Web-Security/issues/3(cve@mitre.org)
https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/Y4tacker/Web-Security/issues/3(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.