Spring-boot-admin sandbox bypass via crafted HTML
High severity
GitHub Reviewed
Published
Jul 14, 2023
to the GitHub Advisory Database
•
Updated Jun 12, 2024
Package
Affected versions
>= 3.0.0, < 3.1.2
< 2.7.16
Patched versions
3.1.2
2.7.16
Description
Published by the National Vulnerability Database
Jul 14, 2023
Published to the GitHub Advisory Database
Jul 14, 2023
Reviewed
Jul 14, 2023
Last updated
Jun 12, 2024
Thymeleaf through 3.1.1.RELEASE as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 allows for a sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI.
Spring Boot Admin 3.1.2 and 2.7.16 contain mitigations for the issue. This bypass is achived via a library called Thymeleaf which has added counter measures for this sort of bypass in version
3.1.2.RELEASE
which has explicity forbidden static access toorg.springframework.util
in expressions. Thymeleaf itself should not be considered vulnerable.References