10
CVSSv2

CVE-2020-11975

Published: 05/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache unomi

Github Repositories

CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection

CVE-2020-13942 CVE-2020-13942 POC by Eugene Rojavski Original blog post about the vulnerability: wwwcheckmarxcom/blog/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/ There are two RCE vectors: through MVEL injection and through OGNL injection Both vectors target different code though the payloads look relatively similar The previous CVE fix nvdn

CVE-2020-11975 CVE-2020-13942

声明 此处提供的漏洞检测方法、文件等内容,均仅限于安全从业者在获得法律授权的情况下使用,目的是检测已授权的服务器的安全性。安全从业者务必遵守法律规定,禁止在没有得到授权的情况下做任何漏洞检测。 简介 参考链接 cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2020-13942 s

Apache Unomi CVE-2020-13942: RCE Vulnerabilities

CVE-2020-13942 Original blog post about the vulnerability: wwwcheckmarxcom/blog/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/ There are two RCE vectors: through MVEL injection and through OGNL injection Both vectors target different code though the payloads look relatively similar The previous CVE fix nvdnistgov/vuln/detail/CVE-2020-11975 tri