CVE-2022-45132

NameCVE-2022-45132
DescriptionIn Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1024428

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lava (PTS)buster2019.01-5fixed
buster (security)2019.01-5+deb10u2fixed
bullseye (security), bullseye2020.12-5+deb11u2fixed
sid, bookworm2023.01-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lavasourcebuster(not affected)
lavasourcebullseye(not affected)
lavasource(unstable)2023.01-11024428

Notes

[bullseye] - lava <not-affected> (Vulnerable code not present)
[buster] - lava <not-affected> (Vulnerable code not present)
https://lists.lavasoftware.org/archives/list/lava-announce@lists.lavasoftware.org/thread/WHXGQMIZAPW3GCQEXYHC32N2ZAAAIYCY/
https://git.lavasoftware.org/lava/lava/-/commit/ab17e8304f10c7c0fe912067f2ed85a4753241c7 (2022.11.1)

Search for package or bug name: Reporting problems