In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md | Exploit Third Party Advisory |
https://www.jfrog.com/confluence/display/RTF/Release+Notes | Release Notes Vendor Advisory |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md | Exploit Third Party Advisory |
https://www.jfrog.com/confluence/display/RTF/Release+Notes | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md - Exploit, Third Party Advisory | |
References | () https://www.jfrog.com/confluence/display/RTF/Release+Notes - Release Notes, Vendor Advisory |
Information
Published : 2020-01-23 15:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7931
Mitre link : CVE-2020-7931
CVE.ORG link : CVE-2020-7931
JSON object : View
Products Affected
jfrog
- artifactory
CWE