CVE-2021-41269
CVSS V2 Medium 6.8
CVSS V3 Critical 9.8
Description
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
Overview
- CVE ID
- CVE-2021-41269
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-11-15T21:15:07
- Last Modified Date
- 2021-11-19T16:17:44
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cron-utils_project:cron-utils:*:*:*:*:*:*:*:* | 1 | OR | 9.1.6 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 9.8
- Base Severity
- CRITICAL
- Exploitability Score
- 3.9
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://github.com/jmrozanec/cron-utils/issues/461 | Exploit Issue Tracking Third Party Advisory |
https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da | Patch Third Party Advisory |
https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87 | Third Party Advisory |
https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da | Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-41269 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41269 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:45:36 | Added to TrackCVE | |||
2022-12-05 14:34:23 | 2021-11-15T21:15Z | 2021-11-15T21:15:07 | CVE Published Date | updated |
2022-12-05 14:34:23 | 2021-11-19T16:17:44 | CVE Modified Date | updated | |
2022-12-05 14:34:23 | Analyzed | Vulnerability Status | updated |