On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://lists.apache.org/thread/n6dhnl68knpxy80t35qxkkw2691l8sfn | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2024/07/18/1 | third party advisory mailing list |