CVE-2022-24881: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.
References
- github.com/advisories/GHSA-fv3m-xhqw-9m79
- github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b
- github.com/ballcat-projects/ballcat-codegen/issues/5
- github.com/ballcat-projects/ballcat-codegen/security/advisories/GHSA-fv3m-xhqw-9m79
- nvd.nist.gov/vuln/detail/CVE-2022-24881
Detect and mitigate CVE-2022-24881 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →