We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Es wurde eine kritische Schwachstelle in aizuda snail-job 1.4.0 ausgemacht. Betroffen hiervon ist die Funktion getRuntime der Datei /snail-job/workflow/check-node-expression der Komponente Workflow-Task Management Module. Mittels dem Manipulieren des Arguments nodeExpression mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
2025-03-21: | Advisory disclosed |
2025-03-21: | VulDB entry created |
2025-03-21: | VulDB entry last update |
startr4ck (VulDB User)
vuldb.com/?id.300624 (VDB-300624 | aizuda snail-job Workflow-Task Management Module check-node-expression getRuntime deserialization)
vuldb.com/?ctiid.300624 (VDB-300624 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.518999 (Submit #518999 | gitee/github snail-job 1.4.0 Command Injection)
gitee.com/aizuda/snail-job/issues/IBSQ24
gitee.com/aizuda/snail-job/issues/IBSQ24
Support options