Arbitrary Code Execution Affecting com.mitchellbosecke:pebble package, versions [,3.1.4)


0.0
critical
  • Attack Complexity

    Low

  • Confidentiality

    High

  • Integrity

    High

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-COMMITCHELLBOSECKE-538371

  • published

    19 Dec 2019

  • disclosed

    19 Dec 2019

  • credit

    ismai1337

How to fix?

Upgrade com.mitchellbosecke:pebble to version 3.1.4 or higher.

Overview

com.mitchellbosecke:pebble is a java templating engine inspired by Twig.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows attackers to bypass a protection mechanism (intended to block access to instances of java.lang.Class) due to getClass being accessible via the public static java.lang.Class java.lang.Class.forName(java.lang.Module,java.lang.String) signature.