cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
References
Link | Resource |
---|---|
https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da | Patch Third Party Advisory |
https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da | Patch Third Party Advisory |
https://github.com/jmrozanec/cron-utils/issues/461 | Exploit Issue Tracking Third Party Advisory |
https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-11-15 21:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-41269
Mitre link : CVE-2021-41269
CVE.ORG link : CVE-2021-41269
JSON object : View
Products Affected
cron-utils_project
- cron-utils
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')