HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
References
Link | Resource |
---|---|
https://github.com/HtmlUnit/htmlunit/releases/tag/2.37.0 | Release Notes Third Party Advisory |
https://jvn.jp/en/jp/JVN34535327/ | Third Party Advisory |
https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563%40%3Ccommits.camel.apache.org%3E | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00023.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4584-1/ | Third Party Advisory |
Configurations
History
15 Oct 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
07 Dec 2023, 17:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:htmlunit:htmlunit:*:*:*:*:*:*:*:* | |
References |
|
|
30 Dec 2021, 20:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:camel:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/08/msg00023.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4584-1/ - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563@%3Ccommits.camel.apache.org%3E - Mailing List, Patch, Third Party Advisory |
Information
Published : 2020-02-11 12:15
Updated : 2024-10-15 19:35
NVD link : CVE-2020-5529
Mitre link : CVE-2020-5529
CVE.ORG link : CVE-2020-5529
JSON object : View
Products Affected
htmlunit
- htmlunit
apache
- camel
debian
- debian_linux
canonical
- ubuntu_linux