First published: Thu Aug 10 2023(Updated: )
Alvaro Munoz discovered that Velocity Engine incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/velocity | <1.7-5+deb9u1build0.20.04.1 | 1.7-5+deb9u1build0.20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/velocity | <1.7-5ubuntu0.18.04.1~esm1 | 1.7-5ubuntu0.18.04.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/velocity | <1.7-4ubuntu0.1~esm1 | 1.7-4ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-6281-1.
If exploited, this vulnerability could allow an attacker to execute arbitrary code.
An attacker can trick a user or an automated system into opening a specially crafted input file.
The affected software includes Ubuntu with Velocity package versions 1.7-5+deb9u1build0.20.04.1, 1.7-5ubuntu0.18.04.1~esm1, and 1.7-4ubuntu0.1~esm1.
To fix this vulnerability, update the Velocity package to version 1.7-5+deb9u1build0.20.04.1, 1.7-5ubuntu0.18.04.1~esm1, or 1.7-4ubuntu0.1~esm1 depending on your Ubuntu version.