info: name: Apache Unomi - Remote Code Execution author: Sourabh-Sahu severity: critical description: | Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process, enabling attackers to execute arbitrary code. impact: | Successful exploitation allows an attacker to execute arbitrary code on the server with the privileges of the Java process, potentially leading to complete system compromise. remediation: | Update Apache Unomi to version 1.5.2or later. Disable OGNL scripting in conditions if not required. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-11975 - https://xz.aliyun.com/news/8157 - https://github.com/1135/unomi_exploit - https://unomi.apache.org/security/cve-2020-11975.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2020-11975 cwe-id: CWE-94 epss-score:0.97373 epss-percentile:0.99982 cpe: cpe:2.3:a:apache:unomi:*:*:*:*:*:*:*:* metadata: verified:true max-request:1 vendor: apache product: unomi shodan-query: 'http.title:"Apache Unomi"||"Apache Unomi"' tags: cve,cve2020,apache,unomi,rce,ognl,oast