com.cronutils:cron-utils@1.1.1 vulnerabilities

  • latest version

    9.2.1

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the com.cronutils:cron-utils package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Arbitrary Code Execution

    com.cronutils:cron-utils is a Java library to parse, migrate and validate crons as well as describe them in human readable language.

    Affected versions of this package are vulnerable to Arbitrary Code Execution via Template Injection that enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE).

    How to fix Arbitrary Code Execution?

    Upgrade com.cronutils:cron-utils to version 9.1.6 or higher.

    [,9.1.6)
    • H
    Improper Control of Generation of Code

    com.cronutils:cron-utils is a Java library to parse, migrate and validate crons as well as describe them in human readable language.

    Affected versions of this package are vulnerable to Improper Control of Generation of Code. A template injection vulnerability is present in previous versions of cron-utils. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected.

    How to fix Improper Control of Generation of Code?

    Upgrade com.cronutils:cron-utils to version 9.1.3 or higher.

    [0,9.1.3)