Vulnerability Name: | CVE-2020-1953 (CCN-177759) | ||||||||||||
Assigned: | 2019-12-02 | ||||||||||||
Published: | 2020-03-13 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application. | ||||||||||||
CVSS v3 Severity: | 10.0 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) 8.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-1953 Source: CCN Type: Apache Web site Apache Commons Configuration Source: XF Type: UNKNOWN apache-cve20201953-code-exec(177759) Source: CCN Type: Apache Mailing List, 2017/04/10 20:53:36 CVE-2017-5648 Apache Tomcat Information Disclosure Source: MISC Type: Not Applicable https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E Source: MISC Type: Mailing List, Third Party Advisory https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E Source: MLIST Type: Mailing List, Patch, Vendor Advisory [camel-commits] 20200313 [camel] branch camel-3.1.x updated: Update Commons Configuration 2 due to CVE-2020-1953 Source: CCN Type: IBM Security Bulletin 6381832 (Blockchain Platform for Cloud) IBP javaenv and dind images Source: CCN Type: IBM Security Bulletin 6409068 (Control Center) Apache Commons Configuration Vulnerability Affects IBM Control Center (CVE-2020-1953) Source: CCN Type: IBM Security Bulletin 6474955 (Sterling Connect:Direct File Agent) Apache Commons Configuration Vulnerability Affects IBM Sterling Connect:Direct File Agent (CVE-2020-1953) Source: CCN Type: IBM Security Bulletin 6520780 (Cloud Pak for Multicloud Management) IBM Cloud Pak for Multicloud Management has applied security fixes for its use of Apache Commons Source: CCN Type: Oracle CPUOct2020 Oracle Critical Patch Update Advisory - October 2020 Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2020.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |