漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Arbitrary code execution in MockServer
Vulnerability Description
MockServer is open source software which enables easy mocking of any system you integrate with via HTTP or HTTPS. An attacker that can trick a victim into visiting a malicious site while running MockServer locally, will be able to run arbitrary code on the MockServer machine. With an overly broad default CORS configuration MockServer allows any site to send cross-site requests. Additionally, MockServer allows you to create dynamic expectations using Javascript or Velocity templates. Both engines may allow an attacker to execute arbitrary code on-behalf of MockServer. By combining these two issues (Overly broad CORS configuration + Script injection), an attacker could serve a malicious page so that if a developer running MockServer visits it, they will get compromised. For more details including a PoC see the referenced GHSL-2021-059.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Vulnerability Title
MockServer 跨站脚本漏洞
Vulnerability Description
MockServer是通过 HTTP 或 HTTPS 模拟任何服务器或服务,例如 REST 或 RPC 服务。 MockServer存在跨站脚本漏洞,该漏洞源于可以诱骗受害者在本地运行MockServer时访问恶意站点的攻击者可利用该漏洞,将能够在MockServer机器上运行任意代码。MockServer的默认CORS配置过于宽泛,允许任何站点发送跨站点请求。
CVSS Information
N/A
Vulnerability Type
N/A