First published: Mon Nov 15 2021(Updated: )
A flaw was found in cron-utils. This flaw allows an attacker to perform unauthenticated Remote Code Execution (RCE) via Java Expression Language (EL) injection.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cron-utils Project Cron-utils | <9.1.6 | |
redhat/cron-utils | <9.1.6 | 9.1.6 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-41269 is a vulnerability in the cron-utils Java library that allows an attacker to perform unauthenticated Remote Code Execution (RCE) by injecting arbitrary Java EL expressions.
cron-utils is a Java library used for defining, parsing, validating, and migrating crons, as well as providing human-readable descriptions for them.
CVE-2021-41269 has a severity rating of critical with a value of 9 on a scale of 1 to 10.
An attacker can exploit CVE-2021-41269 by injecting arbitrary Java EL expressions, which can lead to unauthenticated Remote Code Execution.
To fix CVE-2021-41269, update the cron-utils library to version 9.1.6, which includes the necessary remediation.