GHSA-j6x3-3jqq-m922

Suggest an improvement
Source
https://github.com/advisories/GHSA-j6x3-3jqq-m922
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-j6x3-3jqq-m922/GHSA-j6x3-3jqq-m922.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j6x3-3jqq-m922
Aliases
Published
2022-09-14T00:00:45Z
Modified
2023-11-08T04:10:24.381549Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
CrafterCMS OS Command Injection vulnerability
Details

Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass.

Database specific
{
    "nvd_published_at": "2022-09-13T19:15:00Z",
    "github_reviewed_at": "2022-09-20T17:41:27Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78",
        "CWE-913"
    ]
}
References

Affected packages

Maven / org.craftercms:craftercms

Package

Name
org.craftercms:craftercms
View open source insights on deps.dev
Purl
pkg:maven/org.craftercms/craftercms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.1.0
Fixed
3.1.23