Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
                
            References
                    | Link | Resource | 
|---|---|
| https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101 | Vendor Advisory | 
| https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:51
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 6.5
         v3 : 4.2  | 
| References | () https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101 - Vendor Advisory | 
Information
                Published : 2021-12-02 16:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23258
Mitre link : CVE-2021-23258
CVE.ORG link : CVE-2021-23258
JSON object : View
Products Affected
                craftercms
- crafter_cms
 
CWE
                
                    
                        
                        CWE-913
                        
            Improper Control of Dynamically-Managed Code Resources
