Vulnerabilities > CVE-2020-7799 - Expression Language Injection vulnerability in Fusionauth

047910
CVSS 7.2 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
HIGH
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
fusionauth
CWE-917

Summary

An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/156102/fusionauth110-exec.txt
idPACKETSTORM:156102
last seen2020-01-28
published2020-01-27
reporterGianluca Baldi
sourcehttps://packetstormsecurity.com/files/156102/FusionAuth-1.10-Remote-Command-Execution.html
titleFusionAuth 1.10 Remote Command Execution