MetaSpore
MetaSpore copied to clipboard
Fix GHSL-2025-035 & GHSL-2025-036: Command injection in S3 model download and Spring Actuator Exposure
Fix GHSL-2025-035: Prevent command injection in S3 model downloading
- Validate S3 path format to block special characters
- Replace Runtime.exec() with ProcessBuilder to prevent shell injection
- Blocks --endpoint-url injection and AWS token leakage attempts
Fix GHSL-2025-036: Restrict Spring Actuator endpoint exposure
- Changed management.endpoints.web.exposure.include from * to health,info,pullConfig
- Prevents unauthorized access to sensitive endpoints like heapdump, env, beans
- Maintains required functionality with pullConfig endpoint for Consul configuration refresh