Vulnerability Description
An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Beetl Project | Beetl | 3.15 |
References
- https://gitee.com/xiandafu/beetl/issues/I6RUIPExploitIssue TrackingThird Party Advisory
- https://github.com/luelueking/Beetl-3.15.0-vuln-pocExploitThird Party Advisory
- https://gitee.com/xiandafu/beetl/issues/I6RUIPExploitIssue TrackingThird Party Advisory
- https://github.com/luelueking/Beetl-3.15.0-vuln-pocExploitThird Party Advisory
FAQ
What is CVE-2023-30331?
CVE-2023-30331 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.
How severe is CVE-2023-30331?
CVE-2023-30331 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-30331?
Check the references section above for vendor advisories and patch information. Affected products include: Beetl Project Beetl.