UBUNTU-CVE-2023-49093

Source
https://ubuntu.com/security/CVE-2023-49093
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-49093.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-49093
Related
Published
2023-12-04T05:15:00Z
Modified
2024-10-15T14:11:50Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

HtmlUnit is a GUI-less browser for Java programs. HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. This vulnerability has been patched in version 3.9.0

References

Affected packages

Ubuntu:Pro:16.04:LTS / htmlunit

Package

Name
htmlunit
Purl
pkg:deb/ubuntu/htmlunit?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.8-1ubuntu2
2.8-1ubuntu2.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "This is a vulnerability that can be triggered remotely and leads to code execution. A PoC has been made available."
}

Ubuntu:Pro:18.04:LTS / htmlunit

Package

Name
htmlunit
Purl
pkg:deb/ubuntu/htmlunit?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.8-2ubuntu1
2.8-3ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "This is a vulnerability that can be triggered remotely and leads to code execution. A PoC has been made available."
}