CVE-2021-32834

Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:keti:-:*:*:*:*:*:*:*

History

25 Apr 2022, 18:16

Type Values Removed Values Added
CWE CWE-94 CWE-917

16 Sep 2021, 13:58

Type Values Removed Values Added
CPE cpe:2.3:a:eclipse:keti:-:*:*:*:*:*:*:*
References (CONFIRM) https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ - (CONFIRM) https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 8.2
v2 : 6.5
v3 : 9.9

09 Sep 2021, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-09 02:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-32834

Mitre link : CVE-2021-32834

CVE.ORG link : CVE-2021-32834


JSON object : View

Products Affected

eclipse

  • keti
CWE
CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')