This issue was fixed in version 1.2.1.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Krajowa Izba Rozliczeniowa
Krajowa Izba Rozliczeniowa szafirhost |
|
| Vendors & Products |
Krajowa Izba Rozliczeniowa
Krajowa Izba Rozliczeniowa szafirhost |
Fri, 15 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded. This issue was fixed in version 1.2.1. | |
| Title | Remote Code Execution in SzafirHost | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-05-15T11:07:58.948Z
Reserved: 2026-05-05T09:40:05.100Z
Link: CVE-2026-44088
Updated: 2026-05-15T11:07:53.712Z
Status : Received
Published: 2026-05-15T09:16:16.307
Modified: 2026-05-15T09:16:16.307
Link: CVE-2026-44088
No data.
OpenCVE Enrichment
Updated: 2026-05-15T10:30:42Z