Description
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
Remediation
References
https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165
https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava
https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b
https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4
https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4
Related Vulnerabilities
CVE-2018-9206 Vulnerability in npm package blueimp-file-upload
CVE-2018-12536 Vulnerability in maven package org.eclipse.jetty:jetty-util
CVE-2022-25645 Vulnerability in maven package org.webjars.npm:dset
CVE-2023-42794 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2021-32621 Vulnerability in maven package org.xwiki.platform:xwiki-platform-dashboard-macro