A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.300624 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.300624 | signature vdb entry permissions required |
https://vuldb.com/?submit.518999 | third party advisory vdb entry exploit |
https://gitee.com/aizuda/snail-job/issues/IBSQ24 | third party advisory issue tracking exploit |
https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link | third party advisory issue tracking exploit |