Vulnerabilities
Vulnerable Software
Linaro:  >> Lava  >> 2019.04  Security Vulnerabilities
In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.
CVSS Score
9.8
EPSS Score
0.05
Published
2022-11-18
In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-11-18
In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.
CVSS Score
8.8
EPSS Score
0.003
Published
2022-10-13


Contact Us

Shodan ® - All rights reserved