Linaro

Lava

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.81%
  • Veröffentlicht 18.11.2022 23:15:29
  • Zuletzt bearbeitet 30.04.2025 15:15:58

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 ...

  • EPSS 0.15%
  • Veröffentlicht 18.11.2022 21:15:11
  • Zuletzt bearbeitet 29.04.2025 19:15:52

In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service.

  • EPSS 0.37%
  • Veröffentlicht 13.10.2022 03:15:09
  • Zuletzt bearbeitet 15.05.2025 17:15:47

In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided ...

  • EPSS 0.27%
  • Veröffentlicht 19.06.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:26

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for file: URLs, a user can force lava-server-gunicorn to download any file from the filesystem if it's readable by lavaserver and valid yaml.

  • EPSS 0.33%
  • Veröffentlicht 19.06.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:26

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for URLs in the submit page, a user can forge an HTTP request that will force lava-server-gunicorn to return any file on the server that is readable by lavaserver and vali...

  • EPSS 2.63%
  • Veröffentlicht 19.06.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:27

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.