Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063.
References
Link | Resource |
---|---|
https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ | Exploit Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.2 |
Information
Published : 2021-09-09 02:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32834
Mitre link : CVE-2021-32834
CVE.ORG link : CVE-2021-32834
JSON object : View
Products Affected
eclipse
- keti