CVE-2021-32834

Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:keti:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ - Exploit, Third Party Advisory () https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ - Exploit, Third Party Advisory
CVSS v2 : 6.5
v3 : 9.9
v2 : 6.5
v3 : 8.2

Information

Published : 2021-09-09 02:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32834

Mitre link : CVE-2021-32834

CVE.ORG link : CVE-2021-32834


JSON object : View

Products Affected

eclipse

  • keti
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')