An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows remote attackers to execute arbitrary code because there is a mishandling of the capability for administrators to write and run Groovy scripts within the updater editor. An attacker must use an AST transforming annotation such as @Grab.
References
Link | Resource |
---|---|
https://tvrbk.github.io/cve/2021/03/09/brXM.html | Exploit Third Party Advisory |
https://tvrbk.github.io/cve/2021/03/09/brXM.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://tvrbk.github.io/cve/2021/03/09/brXM.html - Exploit, Third Party Advisory |
Information
Published : 2021-03-11 18:15
Updated : 2024-11-21 05:04
NVD link : CVE-2020-14987
Mitre link : CVE-2020-14987
CVE.ORG link : CVE-2020-14987
JSON object : View
Products Affected
bloomreach
- experience_manager