CVE-2020-26282

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-26282
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26282.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26282
Aliases
Published
2020-12-24T21:15:12Z
Modified
2024-05-14T07:53:42.722388Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

BrowserUp Proxy allows you to manipulate HTTP requests and responses, capture HTTP content, and export performance data as a HAR file. BrowserUp Proxy works well as a standalone proxy server, but it is especially useful when embedded in Selenium tests. A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been patched in version 2.1.2.

References

Affected packages

Git / github.com/browserup/browserup-proxy

Affected ranges

Type
GIT
Repo
https://github.com/browserup/browserup-proxy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.2.0
v1.2.1

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.1