Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
References
| Link | Resource |
|---|---|
| http://unomi.apache.org/security/cve-2020-11975.txt | Patch Vendor Advisory |
| https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95@%3Ccommits.unomi.apache.org%3E | Mailing List Patch Vendor Advisory |
| https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E | Mailing List Patch Vendor Advisory |
Configurations
Information
Published : 2020-06-05 15:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-11975
Mitre link : CVE-2020-11975
JSON object : View
Products Affected
apache
- unomi
CWE
CWE-20
Improper Input Validation
