Arbitrary Code Execution Affecting org.javadelight:delight-nashorn-sandbox Open this link in a new tab package, versions [,0.2.0)
Exploit Maturity
Proof of concept
Attack Complexity
Low
Privileges Required
High
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGJAVADELIGHT-1279048
-
published
4 May 2021
-
disclosed
3 May 2021
-
credit
Max Rohde, Anthony Weems
Introduced: 3 May 2021
CWE-94 Open this link in a new tabHow to fix?
Upgrade org.javadelight:delight-nashorn-sandbox
to version 0.2.0 or higher.
Overview
org.javadelight:delight-nashorn-sandbox is an A safe sandbox to execute JavaScript code from Nashorn.
Affected versions of this package are vulnerable to Arbitrary Code Execution. It exposes an instance of NashronScriptEngine
through the engine
property.
PoC
sandbox.eval("delete this.engine; this.engine.factory.scriptEngine.compile('var File = Java.type(\"java.io.File\"); File;').eval()");