
Cloud Vulnerability DB
A community-led vulnerabilities database
PowerJob v4.3.3 contains a remote command execution (RCE) vulnerability that can be exploited via the instanceId parameter at /instance/detail endpoint. The vulnerability was discovered and disclosed in July 2023 (PowerJob Issue, NVD). This vulnerability affects PowerJob versions up to 4.3.3.
The vulnerability exists due to insufficient validation of user inputs in the JobController's runImmediately method. The application processes tasks through different handlers based on task types (lightweight or heavyweight), where the ProcessorInfo parameter can be manipulated to execute arbitrary system commands. The vulnerability has received a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected system. This can lead to complete system compromise, as the attacker can execute commands with the same privileges as the PowerJob application (Fortinet IPS).
Currently, there is no official patch available for this vulnerability. It is recommended to implement proper authentication mechanisms and consider removing built-in shell execution capabilities. Users should restrict access to the PowerJob interface and monitor for suspicious activities (PowerJob Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."