提交 #768949: AutohomeCorp frostmourne <=1.0 remote code execution信息

标题AutohomeCorp frostmourne <=1.0 remote code execution
描述A critical remote code execution vulnerability exists in Frostmourne's alarm expression evaluation system. Authenticated administrative users can inject arbitrary JavaScript code via the alarm configuration interface, which is then executed by the Nashorn script engine without validation, leading to complete server compromise.
来源⚠️ https://github.com/AnalogyC0de/public_exp/issues/17
用户
 Ana10gy (UID 93358)
提交2026-02-27 08時13分 (1 月前)
管理2026-03-11 14時39分 (12 days later)
状态已接受
VulDB条目350397 [AutohomeCorp frostmourne 直到 1.0 Oracle Nashorn JavaScript Engine ExpressionRule.java scriptEngine.eval EXPRESSION 权限提升]
积分18

Interested in the pricing of exploits?

See the underground prices here!