2 results (0.003 seconds)

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

Zepl Notebooks before 2021-10-25 are affected by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services. Todas las versiones anteriores al 25 de octubre de 2021 de Zepl Notebooks están afectadas por una vulnerabilidad de escape de sandbox. Al iniciar una ejecución de código remota desde el cuaderno, los usuarios pueden usarlo para escapar posteriormente del sandbox del contexto en ejecución y proceder a acceder a activos internos de Zepl, incluidos servicios de metadatos en la nube. • http://zepl.com https://seclists.org/fulldisclosure/2022/Feb/32 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Remote Code Execution (RCE) vulnerability exists in Zepl Notebooks all previous versions before October 25 2021. Users can register for an account and are allocated a set number of credits to try the product. Once users authenticate, they can proceed to create a new organization by which additional users can be added for various collaboration abilities, which allows malicious user to create new Zepl Notebooks with various languages, contexts, and deployment scenarios. Upon creating a new notebook with specially crafted malicious code, a user can then launch remote code execution. Se presenta una vulnerabilidad de ejecución de código remota (RCE) en Zepl Notebooks todas las versiones anteriores al 25 de octubre de 2021. • http://zepl.com https://seclists.org/fulldisclosure/2022/Feb/31 •