HTTP: Apache Unomi Context.js Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Apache Unomi. A successful attack can lead to arbitrary code execution.

Extended Description

It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.

Affected Products

Apache unomi

References

CVE: CVE-2020-11975

Short Name
HTTP:APACHE:UNOMI-CTX-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Apache CVE-2020-11975 CVE-2020-13942 Code Context.js Execution Remote Unomi
Release Date
12/21/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3856
False Positive
Unknown
Vendors

Apache

CVSS Score

7.5

Found a potential security threat?