First published: Tue Feb 11 2020(Updated: )
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Htmlunit Project Htmlunit | <2.37.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Apache Camel | ||
debian/htmlunit | ||
Htmlunit Htmlunit | <2.37.0 | |
maven/net.sourceforge.htmlunit:htmlunit | <2.37.0 | 2.37.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this code execution vulnerability is CVE-2020-5529.
The severity score for CVE-2020-5529 is 8.1 (high).
The affected software for CVE-2020-5529 includes HtmlUnit prior to version 2.37.0, Htmlunit Project Htmlunit, Debian Debian Linux 9.0, and Canonical Ubuntu Linux 16.04.
This vulnerability allows code execution by improperly initializing the Rhino engine in HtmlUnit, which enables the execution of arbitrary Java code on the application.
Yes, the fix for CVE-2020-5529 is available in HtmlUnit version 2.37.0. It is recommended to update to this version to mitigate the vulnerability.