CVE-2020-7931

In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*
cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md - Exploit, Third Party Advisory () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md - Exploit, Third Party Advisory
References () https://www.jfrog.com/confluence/display/RTF/Release+Notes - Release Notes, Vendor Advisory () https://www.jfrog.com/confluence/display/RTF/Release+Notes - Release Notes, Vendor Advisory

Information

Published : 2020-01-23 15:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-7931

Mitre link : CVE-2020-7931

CVE.ORG link : CVE-2020-7931


JSON object : View

Products Affected

jfrog

  • artifactory