CVE-2021-41269

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-41269
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41269.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-41269
Aliases
Related
Published
2021-11-15T21:15:07Z
Modified
2025-01-08T12:27:32.126995Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.

References

Affected packages

Git / github.com/jmrozanec/cron-utils

Affected ranges

Type
GIT
Repo
https://github.com/jmrozanec/cron-utils
Events

Affected versions

1.*

1.0.0
1.1.0
1.1.1
1.1.2

2.*

2.0.0

3.*

3.0.0
3.1.0
3.1.1
3.1.2
3.1.4
3.1.5
3.1.6
3.1.7

4.*

4.0.0
4.0.1
4.1.0
4.1.1

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.0.5

6.*

6.0.0
6.0.1
6.0.2
6.0.3
6.0.4
6.0.5

7.*

7.0.0
7.0.1
7.0.2
7.0.3
7.0.4
7.0.5
7.0.6
7.0.7

8.*

8.0.0
8.1.1

9.*

9.0.0
9.0.1
9.0.2
9.1.0
9.1.1
9.1.2
9.1.3
9.1.4
9.1.5