Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
References
Link | Resource |
---|---|
https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101 | Vendor Advisory |
https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101 | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 4.2 |
References | () https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101 - Vendor Advisory |
Information
Published : 2021-12-02 16:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23258
Mitre link : CVE-2021-23258
CVE.ORG link : CVE-2021-23258
JSON object : View
Products Affected
craftercms
- crafter_cms
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources