CVE-2022-24816: Improper Control of Generation of Code ('Code Injection') in jai-ext
(updated )
Programs using jt-jiffle, and allowing Jiffle script to be provided via network request, are susceptible to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project.
References
- github.com/advisories/GHSA-v92f-jx6p-73rx
- github.com/geosolutions-it/jai-ext
- github.com/geosolutions-it/jai-ext/commit/cb1d6565d38954676b0a366da4f965fef38da1cb
- github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx
- nvd.nist.gov/vuln/detail/CVE-2022-24816
- www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24816
Code Behaviors & Features
Detect and mitigate CVE-2022-24816 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →