A vulnerability, which was classified as critical, was found in maku-boot up to 2.2.0. This affects the function doExecute of the file AbstractScheduleJob.java of the component Scheduled Task Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 446eb7294332efca2bfd791bc37281cedac0d0ff. It is recommended to apply a patch to fix this issue. The identifier VDB-215013 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://gitee.com/makunet/maku-boot/commit/446eb7294332efca2bfd791bc37281cedac0d0ff | Patch Permissions Required Third Party Advisory |
https://gitee.com/makunet/maku-boot/issues/I5ZUYI | Exploit Issue Tracking Patch Third Party Advisory |
https://vuldb.com/?id.215013 | Third Party Advisory |
https://gitee.com/makunet/maku-boot/commit/446eb7294332efca2bfd791bc37281cedac0d0ff | Patch Permissions Required Third Party Advisory |
https://gitee.com/makunet/maku-boot/issues/I5ZUYI | Exploit Issue Tracking Patch Third Party Advisory |
https://vuldb.com/?id.215013 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-12-07 07:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4322
Mitre link : CVE-2022-4322
CVE.ORG link : CVE-2022-4322
JSON object : View
Products Affected
maku
- maku-boot