CVE-2020-13942
CRITICAL EXPLOITED NUCLEIApache Unomi < 1.5.2 - Injection
Title source: ruleDescription
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
Exploits (9)
nomisec
WORKING POC
3 stars
by blackmarketer · remote
https://github.com/blackmarketer/CVE-2020-13942
Nuclei Templates (1)
Apache Unomi <1.5.2 - Remote Code Execution
CRITICALby dwisiswant0
References (9)
Scores
CVSS v3
9.8
EPSS
0.9429
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-04-12
CWE
CWE-74
CWE-20
Status
published
Products (2)
apache/unomi
1.5.0 - 1.5.2
org.apache.unomi/unomi
0 - 1.5.2Maven
Published
Nov 24, 2020
Tracked Since
Feb 18, 2026