GHSA-p7w2-784m-qpq9

Suggest an improvement
Source
https://github.com/advisories/GHSA-p7w2-784m-qpq9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-p7w2-784m-qpq9/GHSA-p7w2-784m-qpq9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-p7w2-784m-qpq9
Aliases
Published
2023-07-12T12:31:35Z
Modified
2023-11-08T04:10:53.882045Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Apache Ambari Expression Language Injection vulnerability
Details

SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.

Database specific
{
    "nvd_published_at": "2023-07-12T10:15:09Z",
    "cwe_ids": [
        "CWE-917"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-12T17:29:53Z"
}
References

Affected packages

Maven / org.apache.ambari:ambari

Package

Name
org.apache.ambari:ambari
View open source insights on deps.dev
Purl
pkg:maven/org.apache.ambari/ambari

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.7.0
Fixed
2.7.7