org.apache.unomi:unomi-common@1.3.0-incubating vulnerabilities

  • latest version

    2.6.1

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.unomi:unomi-common package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Remote Code Execution (RCE)

    org.apache.unomi:unomi-common is a package that stores user profile information and is mostly used to provide a backend server for A/B testing and personalization.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE). It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint.

    How to fix Remote Code Execution (RCE)?

    Upgrade org.apache.unomi:unomi-common to version 1.5.2 or higher.

    [,1.5.2)
    • C
    Remote Code Execution (RCE)

    org.apache.unomi:unomi-common is a package that stores user profile information and is mostly used to provide a backend server for A/B testing and personalization.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE). It allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.

    How to fix Remote Code Execution (RCE)?

    Upgrade org.apache.unomi:unomi-common to version 1.5.1 or higher.

    [,1.5.1)