<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugzilla.rosa.ru/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4"
          urlbase="https://bugzilla.rosa.ru/"
          
          maintainer="d.postnikov@rosa.ru"
>

    <bug>
          <bug_id>13829</bug_id>
          
          <creation_ts>2023-10-18 20:24:41 +0300</creation_ts>
          <short_desc>[CVE 21] codegen 0.6.8  CVEs found</short_desc>
          <delta_ts>2023-10-27 19:08:40 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>2</classification_id>
          <classification>ROSA-based products</classification>
          <product>ROSA Fresh</product>
          <component>System (kernel, glibc, systemd, bash, PAM...)</component>
          <version>All</version>
          <rep_platform>All</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>INVALID</resolution>
          
          
          <bug_file_loc>CVE-2022-24881,</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>Highest</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Yury">y.tumanov</reporter>
          <assigned_to name="ROSA Linux Bugs">bugs</assigned_to>
          <cc>a.proklov</cc>
    
    <cc>e.kosachev</cc>
    
    <cc>s.matveev</cc>
    
    <cc>v.potapov</cc>
    
    <cc>y.tumanov</cc>
          
          <cf_platform>2021.1</cf_platform>
          <cf_security_code></cf_security_code>
          <cf_package></cf_package>
          

      

      

      <flag name="secteam_verified"
          id="14129"
          type_id="2"
          status="+"
          setter="y.tumanov"
    />

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>69717</commentid>
    <comment_count>0</comment_count>
    <who name="Yury">y.tumanov</who>
    <bug_when>2023-10-18 20:24:41 +0300</bug_when>
    <thetext>Please patch CVEs for package codegen version 0.6.8
  
INFO (CVEs are): codegen 0.6.8
 cves found
CVE-2022-24881
Desc: Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-24881
Severity: CRITICAL</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>70037</commentid>
    <comment_count>1</comment_count>
    <who name="Vladimir Potapov">v.potapov</who>
    <bug_when>2023-10-20 11:53:25 +0300</bug_when>
    <thetext>*** Bug 13697 has been marked as a duplicate of this bug. ***</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>70039</commentid>
    <comment_count>2</comment_count>
    <who name="Vladimir Potapov">v.potapov</who>
    <bug_when>2023-10-20 11:53:39 +0300</bug_when>
    <thetext>*** Bug 13506 has been marked as a duplicate of this bug. ***</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>70406</commentid>
    <comment_count>3</comment_count>
    <who name="Aleksandr Proklov">a.proklov</who>
    <bug_when>2023-10-24 03:12:17 +0300</bug_when>
    <thetext>Эта уязвимость не для нашего проекта, это для
https://github.com/ballcat-projects/ballcat-codegen

У нас в репах https://github.com/mysema/codegen т.е. другой проект.
https://abf.io/import/codegen</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>70572</commentid>
    <comment_count>4</comment_count>
    <who name="Yury">y.tumanov</who>
    <bug_when>2023-10-27 19:08:40 +0300</bug_when>
    <thetext>secteam_verified</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>