Search criteria

3 vulnerabilities found for titus by netflix

FKIE_CVE-2020-9297

Vulnerability from fkie_nvd - Published: 2020-07-14 20:15 - Updated: 2024-11-21 05:40
Severity ?
Summary
Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
Impacted products
Vendor Product Version
netflix titus *
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1
netflix titus 0.1.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netflix:titus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D930B3D-11F5-4097-8077-10CE7F1312A0",
              "versionEndIncluding": "0.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "F62AA487-1599-41F4-B2C7-75E495528CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc244:*:*:*:*:*:*",
              "matchCriteriaId": "151CF879-5269-4259-9495-95FB37D25670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc260:*:*:*:*:*:*",
              "matchCriteriaId": "26223265-B99C-45F6-8161-22631D49F3ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc261:*:*:*:*:*:*",
              "matchCriteriaId": "C92446C1-306A-4CB2-81F2-197CBFACCF8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc262:*:*:*:*:*:*",
              "matchCriteriaId": "FD99CD16-1E49-4244-82A7-828DA0EFF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc263:*:*:*:*:*:*",
              "matchCriteriaId": "0A3CD7DE-EDF2-4806-8A80-E0AF82028E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc264:*:*:*:*:*:*",
              "matchCriteriaId": "13DD231B-FC23-4671-BE7F-51AC6031EC4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc265:*:*:*:*:*:*",
              "matchCriteriaId": "D56ACC63-AA86-4570-8FD4-9E61C7DAE32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc266:*:*:*:*:*:*",
              "matchCriteriaId": "12972291-BB01-44F6-A264-09011B427CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc267:*:*:*:*:*:*",
              "matchCriteriaId": "0983B6FA-EF1D-456C-8017-7CAB9AD529FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc268:*:*:*:*:*:*",
              "matchCriteriaId": "28B88B0C-4132-4EF6-8C8A-A635BC4C5415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc269:*:*:*:*:*:*",
              "matchCriteriaId": "A9AE6CE1-A9B3-4903-B3D1-2F3762506DD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc270:*:*:*:*:*:*",
              "matchCriteriaId": "8F42C406-7300-446E-BFB3-1FB0A9AED145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc271:*:*:*:*:*:*",
              "matchCriteriaId": "1ABF7FF8-7054-4065-B3EA-7273E179AE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc272:*:*:*:*:*:*",
              "matchCriteriaId": "58FB5849-DFBE-41A9-B7B5-2C7921E2984F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netflix:titus:0.1.1:rc273:*:*:*:*:*:*",
              "matchCriteriaId": "1DE63B26-8EF9-4400-AF03-FC20F96CDC41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code."
    },
    {
      "lang": "es",
      "value": "Netflix Titus, todas las versiones anteriores a la versi\u00f3n v0.1.1-rc.274, utiliza validadores de restricci\u00f3n personalizados de Java Bean Validation (JSR 380). Cuando se crean mensajes de error de violaci\u00f3n de restricciones personalizadas, diferentes tipos de interpolaci\u00f3n son compatibles, incluidas las expresiones Java EL. Si un atacante puede inyectar datos arbitrarios en la plantilla de mensaje de error que es pasada al argumento de la funci\u00f3n ConstraintValidatorContext.buildConstraintViolationWithTemplate(), podr\u00e1 ejecutar c\u00f3digo Java arbitrario"
    }
  ],
  "id": "CVE-2020-9297",
  "lastModified": "2024-11-21T05:40:22.563",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-14T20:15:11.877",
  "references": [
    {
      "source": "security-report@netflix.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
    }
  ],
  "sourceIdentifier": "security-report@netflix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-917"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2020-9297 (GCVE-0-2020-9297)

Vulnerability from cvelistv5 – Published: 2020-07-14 19:07 – Updated: 2024-08-04 10:26
VLAI?
Summary
Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
Severity ?
No CVSS data available.
CWE
  • Server-Side Template Injection
Assigner
References
Impacted products
Vendor Product Version
n/a Netflix Titus Affected: All versions prior to version v0.1.1-rc.274
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:26:15.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Netflix Titus",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to version v0.1.1-rc.274"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Server-Side Template Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-14T19:07:54",
        "orgId": "ea63fd80-a441-4c7b-ba78-e48a8071cae2",
        "shortName": "netflix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-report@netflix.com",
          "ID": "CVE-2020-9297",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Netflix Titus",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to version v0.1.1-rc.274"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Server-Side Template Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md",
              "refsource": "MISC",
              "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ea63fd80-a441-4c7b-ba78-e48a8071cae2",
    "assignerShortName": "netflix",
    "cveId": "CVE-2020-9297",
    "datePublished": "2020-07-14T19:07:54",
    "dateReserved": "2020-02-19T00:00:00",
    "dateUpdated": "2024-08-04T10:26:15.938Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-9297 (GCVE-0-2020-9297)

Vulnerability from nvd – Published: 2020-07-14 19:07 – Updated: 2024-08-04 10:26
VLAI?
Summary
Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
Severity ?
No CVSS data available.
CWE
  • Server-Side Template Injection
Assigner
References
Impacted products
Vendor Product Version
n/a Netflix Titus Affected: All versions prior to version v0.1.1-rc.274
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:26:15.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Netflix Titus",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to version v0.1.1-rc.274"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Server-Side Template Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-14T19:07:54",
        "orgId": "ea63fd80-a441-4c7b-ba78-e48a8071cae2",
        "shortName": "netflix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-report@netflix.com",
          "ID": "CVE-2020-9297",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Netflix Titus",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to version v0.1.1-rc.274"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Netflix Titus, all versions prior to version v0.1.1-rc.274, uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Server-Side Template Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md",
              "refsource": "MISC",
              "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ea63fd80-a441-4c7b-ba78-e48a8071cae2",
    "assignerShortName": "netflix",
    "cveId": "CVE-2020-9297",
    "datePublished": "2020-07-14T19:07:54",
    "dateReserved": "2020-02-19T00:00:00",
    "dateUpdated": "2024-08-04T10:26:15.938Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}