First published: Fri Jun 25 2021(Updated: )
In Eclipse BIRT versions 4.8.0 and earlier, an attacker can use query parameters to create a JSP file which is accessible from remote (current BIRT viewer dir) to inject JSP code into the running instance.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Business Intelligence And Reporting Tools | <=4.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34427 is a vulnerability in Eclipse BIRT versions 4.8.0 and earlier that allows an attacker to use query parameters to create a JSP file and inject JSP code into the running instance.
CVE-2021-34427 has a severity rating of 9.8, which is considered critical.
Eclipse BIRT versions 4.8.0 and earlier are affected by CVE-2021-34427.
An attacker can exploit CVE-2021-34427 by using query parameters to create a JSP file that is accessible remotely and injecting JSP code into the running instance.
Yes, you can find references for CVE-2021-34427 at the following links: [Link 1](http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html), [Link 2](http://seclists.org/fulldisclosure/2022/Dec/30), [Link 3](https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142).