CVE-2021-46361: Arbitrary code execution in Magnolia CMS
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.75997%
CWE
-
Published
2/12/2022
Updated
2/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
info.magnolia:magnolia-core | maven | < 6.2.12 | 6.2.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around unsafe FreeMarker template processing that allows access to Java reflection primitives. Key indicators from the exploit show:
- HTMLEscapingWebContextWrapper provides access to ServletContext classloader
- FreeMarker's ObjectWrapper enables dangerous class instantiation
- TemplateRenderer is the likely entry point for processing malicious templates While exact patch details aren't shown, the vendor's FreeMarker upgrade and security advisory confirm these components were addressed. Runtime detection would observe classloader access via WebContext and reflection in template processing.