Vulnerability Description
Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eclipse | Keti | - |
Related Weaknesses (CWE)
References
- https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ExploitThird Party Advisory
- https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ExploitThird Party Advisory
FAQ
What is CVE-2021-32834?
CVE-2021-32834 is a vulnerability with a CVSS score of 8.2 (HIGH). Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious G...
How severe is CVE-2021-32834?
CVE-2021-32834 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32834?
Check the references section above for vendor advisories and patch information. Affected products include: Eclipse Keti.