Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

easy-rules-mvel<=4.1.0 远程代码执行漏洞 #347

Open
y1ong opened this issue Dec 31, 2023 · 0 comments
Open

easy-rules-mvel<=4.1.0 远程代码执行漏洞 #347

y1ong opened this issue Dec 31, 2023 · 0 comments
Labels

Comments

@y1ong
Copy link
Owner

y1ong commented Dec 31, 2023

漏洞描述

Easy Rules 是开源的Java规则引擎,easy-rules-mvel 支持使用 MVEL 表达式语言定义规则。
easy-rules-mvel 4.1.0及之前版本中,由于 then 和 when 方法在加载Zer文件时会执行当前 classpath 中与 Zer 文件同名的 class 文件,如果攻击者可向 classpath 中写入与 Zer 文件同名的 class 文件,则可在 easy-rules-mvel 加载Zer文件时远程执行任意代码。

参考链接

  1. https://www.oscs1024.com/hd/MPS-k69p-f547
  2. https://nvd.nist.gov/vuln/detail/CVE-2023-50571
  3. MVELRule Remote Code Execution j-easy/easy-rules#419
@y1ong y1ong added the vuln label Dec 31, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant