CVE-2023-40826

NameCVE-2023-40826
DescriptionAn issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1050834

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libpf4j-java (PTS)bookworm3.8.0+dfsg-2vulnerable
sid, trixie3.10.0+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libpf4j-javasource(unstable)3.9.0+dfsg-21050834

Notes

[bookworm] - libpf4j-java <no-dsa> (Minor issue)
https://github.com/pf4j/pf4j/issues/536
Duplicate/similar to: https://github.com/pf4j/pf4j/issues/526
https://github.com/pf4j/pf4j/pull/538
Fixed by: https://github.com/pf4j/pf4j/commit/8e0aa198c4e652cfc1eb9e05ca9b64397f67cc72

Search for package or bug name: Reporting problems