

To exploit the vulnerability: 1) the attacker needs to have privileges to control JDBC connection parameters 2) and there should be a vulnerable class (constructor with URL parameter and ability to execute code) in the classpath.
#APACHE ANT CRASH COURSE DRIVER#
Affected versions allow a logged-in user to run applications with elevated privileges via the Clipboard Compare tray app after installation.Īpache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via `httpclient_impl` connection property however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare cases remote code execution.
#APACHE ANT CRASH COURSE WINDOWS#
There is an elevation of privilege breakout vulnerability in the Windows EXE installer in Scooter Beyond Compare 4.2.0 through 4.4.2 before 4.4.3. If a standard user places malicious DLLs in the C:\Windows\Temp\ folder, and then the uninstaller is run as SYSTEM, the DLLs will execute with elevated privileges. The uninstaller attempts to load DLLs out of a Windows Temp folder. Reference: CVE-2022-26306 - LibreOfficeĪ DLL hijacking vulnerability exists in the uninstaller in Scooter Beyond Compare 1.8a through 4.4.2 before 4.4.3 when installed via the EXE installer.

This issue affects: Apache OpenOffice versions prior to 4.1.13. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. The stored passwords are encrypted with a single master key provided by the user. Reference: CVE-2022-26307 - LibreOfficeĪpache OpenOffice supports the storage of passwords for web connections in the user's configuration database. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.Īpache OpenOffice supports the storage of passwords for web connections in the user's configuration database.
