CVE-2021-35450

7.2 HIGH

📋 TL;DR

CVE-2021-35450 is a Server-Side Template Injection vulnerability in Entando Admin Console that allows authenticated users with administrative privileges to execute arbitrary commands via FreeMarker templates. This affects Entando Admin Console versions 6.3.9 and earlier. Attackers can achieve remote code execution on the underlying server.

💻 Affected Systems

Products:
  • Entando Admin Console
Versions: 6.3.9 and earlier
Operating Systems: All platforms running Entando
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with administrative privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the Entando server with complete administrative control, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Authenticated attackers with admin privileges execute arbitrary commands to steal sensitive data, modify configurations, or disrupt services.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the Entando application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.10 and later

Vendor Advisory: https://github.com/entando/entando-admin-console

Restart Required: Yes

Instructions:

1. Upgrade Entando Admin Console to version 6.3.10 or later. 2. Restart the Entando application server. 3. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Admin Console Access

all

Limit access to the Entando Admin Console to trusted IP addresses only using network controls.

# Use firewall rules to restrict access to Entando Admin Console port
# Example: iptables -A INPUT -p tcp --dport [ENTANDO_PORT] -s [TRUSTED_IP] -j ACCEPT
# iptables -A INPUT -p tcp --dport [ENTANDO_PORT] -j DROP

Disable FreeMarker Template Execution

all

Configure FreeMarker to disable template execution capabilities if not required.

# In freemarker.properties or configuration: freemarker.template.utility.Execute=disabled

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for admin accounts
  • Monitor and audit all admin console activities for suspicious template execution

🔍 How to Verify

Check if Vulnerable:

Check Entando Admin Console version. If version is 6.3.9 or earlier, the system is vulnerable.

Check Version:

Check Entando application logs or configuration files for version information

Verify Fix Applied:

Verify Entando Admin Console version is 6.3.10 or later and test that template injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FreeMarker template execution patterns
  • Admin console access from unexpected IP addresses
  • Commands executed via template injection

Network Indicators:

  • Unusual outbound connections from Entando server
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="entando" AND ("freemarker.template.utility.Execute" OR "template injection")

🔗 References

📤 Share & Export