An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.
References
Link | Resource |
---|---|
https://gitee.com/xiandafu/beetl/issues/I6RUIP | Exploit Issue Tracking Third Party Advisory |
https://github.com/luelueking/Beetl-3.15.0-vuln-poc | Exploit Third Party Advisory |
https://gitee.com/xiandafu/beetl/issues/I6RUIP | Exploit Issue Tracking Third Party Advisory |
https://github.com/luelueking/Beetl-3.15.0-vuln-poc | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/xiandafu/beetl/issues/I6RUIP - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/luelueking/Beetl-3.15.0-vuln-poc - Exploit, Third Party Advisory |
Information
Published : 2023-05-04 03:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30331
Mitre link : CVE-2023-30331
CVE.ORG link : CVE-2023-30331
JSON object : View
Products Affected
beetl_project
- beetl
CWE