CVE-2020-7799

An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fusionauth:fusionauth:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html - Third Party Advisory, VDB Entry
References () https://fusionauth.io/docs/v1/tech/release-notes - Exploit, Release Notes, Vendor Advisory () https://fusionauth.io/docs/v1/tech/release-notes - Exploit, Release Notes, Vendor Advisory
References () https://lab.mediaservice.net/advisory/2020-03-fusionauth.txt - Third Party Advisory () https://lab.mediaservice.net/advisory/2020-03-fusionauth.txt - Third Party Advisory
References () https://seclists.org/bugtraq/2020/Jan/39 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2020/Jan/39 - Mailing List, Third Party Advisory

Information

Published : 2020-01-28 13:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7799

Mitre link : CVE-2020-7799

CVE.ORG link : CVE-2020-7799


JSON object : View

Products Affected

fusionauth

  • fusionauth
CWE
CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')