CVE-2020-13942

It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:unomi:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-11-24 18:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-13942

Mitre link : CVE-2020-13942

CVE.ORG link : CVE-2020-13942


JSON object : View

Products Affected

apache

  • unomi
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-20

Improper Input Validation