Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04bTlmLWM1cDktd3FjaM4AAxM-

Remote Code Execution in com.bstek.uflo:uflo-core

All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation.

Permalink: https://github.com/advisories/GHSA-8m9f-c5p9-wqch
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04bTlmLWM1cDktd3FjaM4AAxM-
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: 8 months ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-8m9f-c5p9-wqch, CVE-2022-25894
References: Repository: https://github.com/youseries/uflo
Blast Radius: 4.7

Affected Packages

maven:com.bstek.uflo:uflo-core
Dependent packages: 1
Dependent repositories: 3
Downloads:
Affected Version Ranges: <= 2.1.5
No known fixed version
All affected versions: 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5