CVE-2021-41269
moderate-risk
Published 2021-11-15
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.
Do I need to act?
~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: d78d40bbfc09a0a2626a967d2529e3f561f860b7, cfd2880f80e62ea74b92fa83474c2aabdb9899da, d6707503ec2f20947f79e38f861dba93b39df9da
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Cron-Utils
Affected Vendors
References (8)
Third Party Advisory
https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87
Third Party Advisory
https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87
43
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
5/34 · Minimal
Exposure
5/34 · Minimal