Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU5ajQtd2p3cC1tdzlt

Sandbox Bypass in Apache Velocity Engine

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.

Permalink: https://github.com/advisories/GHSA-59j4-wjwp-mw9m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU5ajQtd2p3cC1tdzlt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: over 1 year ago


CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-59j4-wjwp-mw9m, CVE-2020-13936
References: Blast Radius: 38.8

Affected Packages

maven:org.apache.velocity:velocity
Dependent packages: 1,572
Dependent repositories: 25,721
Downloads:
Affected Version Ranges: <= 1.7
No known fixed version
All affected versions: 1.6.1, 1.6.2, 1.6.3, 1.6.4
maven:org.apache.velocity:velocity-engine-parent
Dependent packages: 1
Dependent repositories: 1
Downloads:
Affected Version Ranges: < 2.3
Fixed in: 2.3
All affected versions:
All unaffected versions: