Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. arvados
  4. ›
  5. CVE-2022-36006

CVE-2022-36006: Improper Control of Generation of Code ('Code Injection')

August 15, 2022 (updated June 29, 2023)

Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, is vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based “Workbench 1” app (“apt-get remove arvados-workbench”) from your installation as a workaround.

References

  • arvados.org/release-notes/2.4.2/
  • dev.arvados.org/issues/19316
  • github.com/arvados/arvados/security/advisories/GHSA-8867-q4xf-cqgm
  • nvd.nist.gov/vuln/detail/CVE-2022-36006

Code Behaviors & Features

Detect and mitigate CVE-2022-36006 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.4.2

Fixed versions

  • 2.4.2

Solution

Upgrade to version 2.4.2 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

gem/arvados/CVE-2022-36006.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:05 +0000.