CVE-2023-7148: ShifuML shifu code injection vulnerability
5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.31362%
CWE
Published
12/29/2023
Updated
1/2/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ml.shifu:shifu | maven | <= 0.12.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsafe JEXL expression evaluation:
- The DataPurifier constructor takes user-controlled FilterExpression and creates a JEXL Expression without restrictions
- JexlEngine is initialized without security controls or class whitelisting
- isFilter methods evaluate the expression using a context populated with user data
- The combination allows attackers to craft expressions that execute arbitrary Java code through JEXL's reflection capabilities
- This matches the CWE-94 pattern of code injection via uncontrolled expression evaluation