CVE-2020-13942

CRITICAL EXPLOITED NUCLEI

Apache Unomi < 1.5.2 - Injection

Title source: rule

Description

It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.

Exploits (9)

nomisec WORKING POC 28 stars
by eugenebmx · poc
https://github.com/eugenebmx/CVE-2020-13942
nomisec STUB 9 stars
by shifa123 · remote
https://github.com/shifa123/CVE-2020-13942-POC-
nomisec WORKING POC 6 stars
by lp008 · poc
https://github.com/lp008/CVE-2020-13942
nomisec WORKING POC 4 stars
by yaunsky · remote
https://github.com/yaunsky/Unomi-CVE-2020-13942
nomisec WORKING POC 3 stars
by blackmarketer · remote
https://github.com/blackmarketer/CVE-2020-13942
nomisec WORKING POC
by corsisechero · remote
https://github.com/corsisechero/CVE-2020-13942byVulHub
nomisec WORKING POC
by Prodrious · poc
https://github.com/Prodrious/CVE-2020-13942
nomisec WORKING POC
by dev-team-12x · poc
https://github.com/dev-team-12x/apche_unomi_rce
vulncheck_xdb WORKING POC
remote
https://github.com/1135/unomi_exploit

Nuclei Templates (1)

Apache Unomi <1.5.2 - Remote Code Execution
CRITICALby dwisiswant0

Scores

CVSS v3 9.8
EPSS 0.9429
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-04-12
CWE
CWE-74 CWE-20
Status published
Products (2)
apache/unomi 1.5.0 - 1.5.2
org.apache.unomi/unomi 0 - 1.5.2Maven
Published Nov 24, 2020
Tracked Since Feb 18, 2026