2 results (0.017 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 and other products, allows sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI. • https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 1

In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution. En el componente thymeleaf-spring versión 5.3.0.12, thymeleaf combinado con escenarios específicos en la inyección de plantillas puede conllevar a una ejecución de código remota • https://gitee.com/wayne_wwang/wayne_wwang/blob/master/2021/10/31/ruoyi+thymeleaf-rce/index.html https://security.netapp.com/advisory/ntap-20221014-0001 https://vuldb.com/?id.186365 • CWE-94: Improper Control of Generation of Code ('Code Injection') •