Логотип exploitDog
bind:CVE-2020-13942
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-13942

Количество 2

Количество 2

nvd логотип

CVE-2020-13942

около 5 лет назад

It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-xp5j-wj4h-2jq9

почти 4 года назад

Injection and Improper Input Validation in Apache Unomi

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-13942

It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.

CVSS3: 9.8
94%
Критический
около 5 лет назад
github логотип
GHSA-xp5j-wj4h-2jq9

Injection and Improper Input Validation in Apache Unomi

CVSS3: 9.8
94%
Критический
почти 4 года назад

Уязвимостей на страницу