Access Restriction Bypass Affecting org.graalvm.sdk:graal-sdk Open this link in a new tab package, versions [,20.3.4) [21.0.0,21.3.0)
Attack Complexity
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGGRAALVMSDK-1766172
-
published
21 Oct 2021
-
disclosed
19 Oct 2021
-
credit
Unknown
Introduced: 19 Oct 2021
CVE-2021-35567 Open this link in a new tabHow to fix?
Upgrade org.graalvm.sdk:graal-sdk
to version 20.3.4, 21.3.0 or higher.
Overview
org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.
Affected versions of this package are vulnerable to Access Restriction Bypass via incorrect principal selection when using Kerberos Constrained Delegation result in unauthorized access to critical data or complete access to all GraalVM accessible data.