org.apache.unomi:unomi-common@1.4.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.unomi:unomi-common package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Remote Code Execution (RCE)

org.apache.unomi:unomi-common is a package that stores user profile information and is mostly used to provide a backend server for A/B testing and personalization.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint.

How to fix Remote Code Execution (RCE)?

Upgrade org.apache.unomi:unomi-common to version 1.5.2 or higher.

[,1.5.2)
  • C
Remote Code Execution (RCE)

org.apache.unomi:unomi-common is a package that stores user profile information and is mostly used to provide a backend server for A/B testing and personalization.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). It allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.

How to fix Remote Code Execution (RCE)?

Upgrade org.apache.unomi:unomi-common to version 1.5.1 or higher.

[,1.5.1)