Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security] Vulnerability to Arbitrary code execution #655

Closed
ego93 opened this issue Jul 14, 2023 · 3 comments
Closed

[Security] Vulnerability to Arbitrary code execution #655

ego93 opened this issue Jul 14, 2023 · 3 comments

Comments

@ego93
Copy link

ego93 commented Jul 14, 2023

Pebble Templates in all versions in vulnerable to Arbitrary code execution, only when exposing Spring beans and Servlet related objects (such as the Servlet Context). This may introduce a variety of objects which can be used to bypass the Pebble sandbox. Deep inspection of the exposed objects’ object graph allows an attacker to get access to objects that allow them to instantiate arbitrary Java objects.

This has been caught by Prisma PRISMA-2021-0114

@ebussieres
Copy link
Member

Is it the same thing as #625 ? If yes, the CVE was disputed. Templates should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the templates.

@ego93
Copy link
Author

ego93 commented Jul 17, 2023

I'll rise a ticket with Prisma pointing to #625

@ego93
Copy link
Author

ego93 commented Jul 19, 2023

Prisma response:

As mentioned here - https://nvd.nist.gov/vuln/detail/CVE-2022-37767, it looks like the CVE is disputed by the vendor. The reason this is probably being triggered by Prisma is because the product by design does not do input validation it assumes all code is from a trusted source. As the vulnerability is disputed, our feed still shows this as unresolved and it is an expected behavior from the product.

@ego93 ego93 closed this as completed Jul 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants