CVE-2022-37767
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/09/2022
Last modified:
03/08/2024
Description
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:pebbletemplates:pebble_templates:3.1.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page