CVE-2022-45132
- EPSS 3.81%
- Published 18.11.2022 23:15:29
- Last modified 30.04.2025 15:15:58
In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 ...
CVE-2022-44641
- EPSS 0.15%
- Published 18.11.2022 21:15:11
- Last modified 29.04.2025 19:15:52
In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service.
CVE-2022-42902
- EPSS 0.37%
- Published 13.10.2022 03:15:09
- Last modified 15.05.2025 17:15:47
In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided ...
CVE-2018-12563
- EPSS 0.27%
- Published 19.06.2018 05:29:00
- Last modified 21.11.2024 03:45:26
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for file: URLs, a user can force lava-server-gunicorn to download any file from the filesystem if it's readable by lavaserver and valid yaml.
CVE-2018-12564
- EPSS 0.33%
- Published 19.06.2018 05:29:00
- Last modified 21.11.2024 03:45:26
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for URLs in the submit page, a user can forge an HTTP request that will force lava-server-gunicorn to return any file on the server that is readable by lavaserver and vali...
CVE-2018-12565
- EPSS 2.63%
- Published 19.06.2018 05:29:00
- Last modified 21.11.2024 03:45:27
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.