CVE-2022-42902
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/10/2022
Last modified:
15/05/2025
Description
In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:linaro:lava:*:*:*:*:*:*:*:* | 2022.10 (excluding) | |
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.lavasoftware.org/lava/lava/-/commit/e66b74cd6c175ff8826b8f3431740963be228b52?merge_request_iid=1834
- https://git.lavasoftware.org/lava/lava/-/merge_requests/1834
- https://lists.debian.org/debian-lts-announce/2022/11/msg00019.html
- https://www.debian.org/security/2022/dsa-5260
- https://git.lavasoftware.org/lava/lava/-/commit/e66b74cd6c175ff8826b8f3431740963be228b52?merge_request_iid=1834
- https://git.lavasoftware.org/lava/lava/-/merge_requests/1834
- https://lists.debian.org/debian-lts-announce/2022/11/msg00019.html
- https://www.debian.org/security/2022/dsa-5260



