Loading
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
Use CWE-20, Apache vendor hub and Unomi product page to widen CVE-2020-13942 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-11975 and CVE-2021-31164 for nearby disclosures in the same product family.