Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Execution vulnerabilities in an interactive lesson.
Start learningUpgrade org.javadelight:delight-nashorn-sandbox
to version 0.2.0 or higher.
org.javadelight:delight-nashorn-sandbox is an A safe sandbox to execute JavaScript code from Nashorn.
Affected versions of this package are vulnerable to Arbitrary Code Execution. It exposes an instance of NashronScriptEngine
through the engine
property.
sandbox.eval("delete this.engine; this.engine.factory.scriptEngine.compile('var File = Java.type(\"java.io.File\"); File;').eval()");