Security Announcement-Statement on Apache Unomi remote code execution vulnerability CVE-2020-13942

25-02-2021
  • LinkedIn
  • facebook
  • Twitter

Overview

The background of security vulnerability

Apache Unomi is a java open source customer data platform used to manage customer and visitor data online and provide a personalized experience that complies with visitor privacy rules. Unomi was announced as the top project of Apache in 2019, with a high degree of scalability and ease of use. Recently, the H3C Offensive and Defense Laboratory monitored the foreign security research team to disclose the detailed technical analysis of Apache Unomi remote code execution vulnerabilities, The vulnerability number is CVE-2020-13942, with a CVSS score of 10.0 (high risk and extremely easy to exploit).

The principle of the vulnerability

Unomi relies on expression languages ​​such as OGNL or MVEL, allowing users to write complex and detailed query statements. Before version 1.5.1, these expression languages ​​are completely unrestricted, making Unomi vulnerable to expression injection attacks. Attackers can execute arbitrary codes and system commands by sending malicious requests to the Unomi server. The vulnerability is classified as CVE-2020-11975.

In version 1.5.1 of Aache Unomi, the SecureFilteringClassLoader function was introduced to fix the vulnerability CVE-2020-11975, and the classes used in expressions were filtered by a blacklist. However, in some cases, the MVEL expression can directly use the instantiated class, thus bypassing the restrictions of SecureFilteringClassLoader. A remote attacker can execute arbitrary code or system commands by sending malicious requests to the Unomi server by bypassing the blacklist type of patch detection

The reproduce of security vulnerability

At present, the POC for the exploit of this vulnerability has been made public. Affected users please update the version in time. The screenshot of the successful exploit is as follows:

图片

The scope of influence

Affected version: ApacheUnomi < = 1.5.1

Solution

The official patch

The latest version of the official release has fixed this vulnerability, affected users are requested to upgrade the Apache Unomi version.

Download link: http://unomi.apache.org/download.html

The solution of H3C

The H3C IPS rule base will support the interception of this vulnerability in version 1.0.111. It is recommended to pay attention to the H3C official website to update the version in time and enable relevant rules.

H3C security emergency response external service

H3C advocates that every effort be made to safeguard the ultimate interests of product users, to abide by principles of responsible disclosure of security incidents, and to handle product security issues in accordance with security issues mechanisms. For information on H3C's security emergency response service and H3C product vulnerabilities, please visit https://www.h3c.com/en/Support/Online_Help/psirt/.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网