Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
References
Configurations
History
21 Nov 2024, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4 - Release Notes, Third Party Advisory | |
References | () https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b - Patch, Permissions Required, Third Party Advisory | |
References | () https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165 - Patch, Third Party Advisory | |
References | () https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4 - Release Notes, Third Party Advisory | |
References | () https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava - Exploit, Third Party Advisory |
Information
Published : 2021-02-19 23:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-12668
Mitre link : CVE-2020-12668
CVE.ORG link : CVE-2020-12668
JSON object : View
Products Affected
hubspot
- jinjava
CWE
CWE-863
Incorrect Authorization