漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Deserialization of Untrusted Data in Emissary
Vulnerability Description
Emissary is a distributed, peer-to-peer, data-driven workflow framework. Emissary 6.4.0 is vulnerable to Unsafe Deserialization of post-authenticated requests to the [`WorkSpaceClientEnqueue.action`](https://github.com/NationalSecurityAgency/emissary/blob/30c54ef16c6eb6ed09604a929939fb9f66868382/src/main/java/emissary/server/mvc/internal/WorkSpaceClientEnqueueAction.java) REST endpoint. This issue may lead to post-auth Remote Code Execution. This issue has been patched in version 6.5.0. As a workaround, one can disable network access to Emissary from untrusted sources.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H
Vulnerability Type
可信数据的反序列化
Vulnerability Title
Emissary 代码问题漏洞
Vulnerability Description
Emissary是一个应用软件。一个基于P2P的数据驱动的工作流引擎,可在异构的可能广泛分布的多层P2P网络计算资源中运行。 Emissary 6.4.0 版本中存在安全漏洞,该漏洞源于在已通过鉴权的post请求到 WorkSpaceClientEnqueue.action 时,会导致不安全的反序列化,可能会引起远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A