CVE-2020-5529: Code execution vulnerability in HtmlUnit
(updated )
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
References
- github.com/HtmlUnit/htmlunit
- github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367
- github.com/HtmlUnit/htmlunit/releases/tag/2.37.0
- github.com/advisories/GHSA-5mh9-r3rr-9597
- jvn.jp/en/jp/JVN34535327
- lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563%40%3Ccommits.camel.apache.org%3E
- lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563@%3Ccommits.camel.apache.org%3E
- lists.debian.org/debian-lts-announce/2020/08/msg00023.html
- nvd.nist.gov/vuln/detail/CVE-2020-5529
- usn.ubuntu.com/4584-1
Detect and mitigate CVE-2020-5529 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →