// For flags

CVE-2022-36006

Authenticated remote code execution due to insecure deserialization (GHSL-2022-063)

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based "Workbench 1" app ("apt-get remove arvados-workbench") from your installation as a workaround.

Arvados es una plataforma de código abierto para administrar, procesar y compartir datos genómicos y otros grandes datos científicos y biomédicos. Una vulnerabilidad de ejecución de código remota (RCE) en Arvados Workbench permite a atacantes autenticados ejecutar código arbitrario por medio de cargas útiles JSON especialmente diseñadas. Esto se presenta en todas las versiones hasta 2.4.1 y ha sido corregido en versión 2.4.2. Esta vulnerabilidad es específica de la aplicación Ruby on Rails Workbench ("Workbench 1"). No creemos que ningún otro componente de Arvados, incluyendo la aplicación TypesScript basada en el navegador Workbench ("Workbench 2") o el Servidor API, sean vulnerables a este ataque. Para versiones de Arvados anteriores a 2.4.2: elimine la aplicación "Workbench 1" basada en Ruby ("apt-get remove arvados-workbench") de su instalación como mitigación.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-15 CVE Reserved
  • 2022-08-14 CVE Published
  • 2024-06-30 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arvados
Search vendor "Arvados"
Arvados
Search vendor "Arvados" for product "Arvados"
< 2.4.2
Search vendor "Arvados" for product "Arvados" and version " < 2.4.2"
ruby
Affected