Description
Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.
Remediation
References
https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b
https://github.com/ballcat-projects/ballcat-codegen/issues/5
https://github.com/ballcat-projects/ballcat-codegen/security/advisories/GHSA-fv3m-xhqw-9m79
Related Vulnerabilities
CVE-2016-9177 Vulnerability in maven package com.sparkjava:spark-core
CVE-2021-4264 Vulnerability in maven package org.webjars:dustjs-linkedin
CVE-2022-4772 Vulnerability in maven package com.github.dgarijo:widoco
CVE-2021-41165 Vulnerability in npm package ckeditor4
CVE-2023-40348 Vulnerability in maven package org.jenkins-ci.plugins:gogs-webhook