Mageia 2021-0183: velocity security update | LinuxSecurity.com
MGASA-2021-0183 - Updated velocity packages fix security vulnerability

Publication date: 12 Apr 2021
URL: https://advisories.mageia.org/MGASA-2021-0183.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2020-13936

An attacker that is able to modify Velocity templates may execute arbitrary
Java code or run arbitrary system commands with the same privileges as the
account running the Servlet container.  This applies to applications that allow
untrusted users to upload/modify velocity templates running Apache Velocity
Engine versions up to 2.2 (CVE-2020-13936).

References:
- https://bugs.mageia.org/show_bug.cgi?id=28681
- https://www.openwall.com/lists/oss-security/2021/03/10/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13936

SRPMS:
- 8/core/velocity-1.7-33.1.mga8
- 7/core/velocity-1.7-22.1.mga7

Mageia 2021-0183: velocity security update

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet c...

Summary

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2 (CVE-2020-13936).

References

- https://bugs.mageia.org/show_bug.cgi?id=28681

- https://www.openwall.com/lists/oss-security/2021/03/10/1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13936

Resolution

MGASA-2021-0183 - Updated velocity packages fix security vulnerability

SRPMS

- 8/core/velocity-1.7-33.1.mga8

- 7/core/velocity-1.7-22.1.mga7

Severity
Publication date: 12 Apr 2021
URL: https://advisories.mageia.org/MGASA-2021-0183.html
Type: security
CVE: CVE-2020-13936

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.