aizuda snail-job Vulnerable to Deserialization via `nodeExpression` Argument
Moderate severity
GitHub Reviewed
Published
Mar 22, 2025
to the GitHub Advisory Database
•
Updated Mar 24, 2025
Description
Published by the National Vulnerability Database
Mar 22, 2025
Published to the GitHub Advisory Database
Mar 22, 2025
Reviewed
Mar 24, 2025
Last updated
Mar 24, 2025
A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References