An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.
References
Link | Resource |
---|---|
https://lab.mediaservice.net/advisory/2020-03-fusionauth.txt | Third Party Advisory |
http://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html | Third Party Advisory VDB Entry |
https://fusionauth.io/docs/v1/tech/release-notes | Exploit Release Notes Vendor Advisory |
https://seclists.org/bugtraq/2020/Jan/39 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-01-28 05:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-7799
Mitre link : CVE-2020-7799
JSON object : View
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
Products Affected
fusionauth
- fusionauth