9.2.1
11 years ago
3 years ago
Known vulnerabilities in the com.cronutils:cron-utils package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
com.cronutils:cron-utils is a Java library to parse, migrate and validate crons as well as describe them in human readable language. Affected versions of this package are vulnerable to Arbitrary Code Execution via Template Injection that enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE). How to fix Arbitrary Code Execution? Upgrade | [,9.1.6) |
com.cronutils:cron-utils is a Java library to parse, migrate and validate crons as well as describe them in human readable language. Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection'). A template injection vulnerability is present in previous versions of cron-utils. This enables attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Only projects using the @Cron annotation to validate untrusted Cron expressions are affected. How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade | [0,9.1.3) |