In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2019-0006.md | Exploit Third Party Advisory |
https://www.jfrog.com/confluence/display/RTF/Release+Notes | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-01-23 15:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-7931
Mitre link : CVE-2020-7931
CVE.ORG link : CVE-2020-7931
JSON object : View
Products Affected
jfrog
- artifactory
CWE