CVE-2024-28253: OpenMetaData – SpEL Injection in PUT /api/v1/policies

CVE-2024-28253: OpenMetaData - SpEL Injection in PUT /api/v1/policies-渗透云记 - 专注于网络安全与技术分享
CVE-2024-28253: OpenMetaData – SpEL Injection in PUT /api/v1/policies
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2024-28253: OpenMetaData – SpEL Injection in PUT /api/v1/policies

漏洞描述

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. `CompiledRule::validateExpression` is also called from `PolicyRepository.prepare`. `prepare()` is called from `EntityRepository.prepareInternal()` which, in turn, gets called from `EntityResource.createOrUpdate()`. Note that even though there is an authorization check (`authorizer.authorize()`), it gets called after `prepareInternal()` gets called and therefore after the SpEL expression has been evaluated. In order to reach this method, an attacker can send a PUT request to `/api/v1/policies` which gets handled by `PolicyResource.createOrUpdate()`. This vulnerability was discovered with the help of CodeQL's Expression language injection (Spring) query and is also tracked as `GHSL-2023-252`. This issue may lead to Remote Code Execution and has been addressed in version 1.3.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享