Vulnerability Name: | CVE-2020-5529 (CCN-175998) | ||||||||||||
Assigned: | 2020-01-06 | ||||||||||||
Published: | 2020-01-06 | ||||||||||||
Updated: | 2021-12-30 | ||||||||||||
Summary: | HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-665 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-5529 Source: CCN Type: JVN#34535327 HtmlUnit vulenerable to arbitrary code execution Source: XF Type: UNKNOWN htmlunit-cve20205529-code-exec(175998) Source: CCN Type: HtmlUnit GIT Repository Release HtmlUnit-2.37.0 · HtmlUnit/htmlunit · GitHub Source: CONFIRM Type: Release Notes, Third Party Advisory https://github.com/HtmlUnit/htmlunit/releases/tag/2.37.0 Source: JVN Type: Third Party Advisory https://jvn.jp/en/jp/JVN34535327/ Source: MLIST Type: Mailing List, Patch, Third Party Advisory [camel-commits] 20200520 [camel] branch camel-2.25.x updated: Updating htmlunit due to CVE-2020-5529 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200815 [SECURITY] [DLA 2326-1] htmlunit security update Source: UBUNTU Type: Third Party Advisory USN-4584-1 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: ![]() | ||||||||||||
BACK |