com.cronutils:cron-utils@5.0.3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.cronutils:cron-utils package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Arbitrary Code Execution

com.cronutils:cron-utils is a Java library to parse, migrate and validate crons as well as describe them in human readable language.

Affected versions of this package are vulnerable to Arbitrary Code Execution via Template Injection that enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE).

How to fix Arbitrary Code Execution?

Upgrade com.cronutils:cron-utils to version 9.1.6 or higher.

[,9.1.6)
  • H
Improper Control of Generation of Code

com.cronutils:cron-utils is a Java library to parse, migrate and validate crons as well as describe them in human readable language.

Affected versions of this package are vulnerable to Improper Control of Generation of Code. A template injection vulnerability is present in previous versions of cron-utils. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected.

How to fix Improper Control of Generation of Code?

Upgrade com.cronutils:cron-utils to version 9.1.3 or higher.

[0,9.1.3)