CVE-2020-14987

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows remote attackers to execute arbitrary code because there is a mishandling of the capability for administrators to write and run Groovy scripts within the updater editor. An attacker must use an AST transforming annotation such as @Grab.
References
Link Resource
https://tvrbk.github.io/cve/2021/03/09/brXM.html Exploit Third Party Advisory
https://tvrbk.github.io/cve/2021/03/09/brXM.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bloomreach:experience_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
References () https://tvrbk.github.io/cve/2021/03/09/brXM.html - Exploit, Third Party Advisory () https://tvrbk.github.io/cve/2021/03/09/brXM.html - Exploit, Third Party Advisory

Information

Published : 2021-03-11 18:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-14987

Mitre link : CVE-2020-14987

CVE.ORG link : CVE-2020-14987


JSON object : View

Products Affected

bloomreach

  • experience_manager
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-862

Missing Authorization