GHSA-8m9f-c5p9-wqch

Suggest an improvement
Source
https://github.com/advisories/GHSA-8m9f-c5p9-wqch
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-8m9f-c5p9-wqch/GHSA-8m9f-c5p9-wqch.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8m9f-c5p9-wqch
Aliases
  • CVE-2022-25894
Published
2023-01-26T21:30:25Z
Modified
2024-02-16T08:22:31.408576Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Remote Code Execution in com.bstek.uflo:uflo-core
Details

All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation.

Database specific
{
    "nvd_published_at": "2023-01-26T21:15:00Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-01-27T01:01:03Z"
}
References

Affected packages

Maven / com.bstek.uflo:uflo-core

Package

Name
com.bstek.uflo:uflo-core
View open source insights on deps.dev
Purl
pkg:maven/com.bstek.uflo/uflo-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.1.5

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5