In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-48049 In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-30T14:36:37.228Z

Reserved: 2022-11-10T00:00:00.000Z

Link: CVE-2022-45132

cve-icon Vulnrichment

Updated: 2024-08-03T14:09:56.476Z

cve-icon NVD

Status : Modified

Published: 2022-11-18T23:15:29.637

Modified: 2025-04-30T15:15:58.903

Link: CVE-2022-45132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.