TROYANOSYVIRUS
Back to CVEs

CVE-2020-13942

CRITICAL
9.8

Description

It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/24/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

apache:unomi

Weaknesses (CWE)

CWE-20CWE-74

References

http://unomi.apache.org./security/cve-2020-13942.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2020/11/24/5(af854a3a-2127-422b-91ae-364da2661108)
https://advisory.checkmarx.net/advisory/CX-2020-4284(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.