ID |
CVE-2025-1686
|
Sažetak |
All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ.
Workaround
This vulnerability can be mitigated by disabling the include macro in Pebble Templates:
java
new PebbleEngine.Builder()
.registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder()
.disallowedTokenParserTags(List.of("include"))
.build())
.build(); |
Reference |
|
CVSS |
Base: | 6.8 |
Impact: | 4.0 |
Exploitability: | 2.3 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
HIGH |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
NONE |
NONE |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N |
Zadnje važnije ažuriranje |
27-02-2025 - 15:15 |
Objavljeno |
27-02-2025 - 05:15 |