CVE-2020-13936

Summary

CVECVE-2020-13936
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-03-10 08:15:00 UTC
Updated2023-11-07 03:17:00 UTC
DescriptionAn attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Apache Velocity Engine All All All All
Application Apache Wss4j 2.3.1 All All All
Operating System Debian Debian Linux 9.0 All All All
Application Oracle Banking Deposits And Lines Of Credit Servicing 2.12.0 All All All
Application Oracle Banking Enterprise Default Management 2.10.0 All All All
Application Oracle Banking Enterprise Default Management 2.12.0 All All All
Application Oracle Banking Enterprise Default Management 2.6.2 All All All
Application Oracle Banking Enterprise Default Management 2.7.1 All All All
Application Oracle Banking Enterprise Default Management All All All All
Application Oracle Banking Loans Servicing 2.12.0 All All All
Application Oracle Banking Party Management 2.7.0 All All All
Application Oracle Banking Platform 2.6.2 All All All
Application Oracle Banking Platform 2.7.1 All All All
Application Oracle Banking Platform All All All All
Application Oracle Communications Cloud Native Core Policy 1.14.0 All All All
Application Oracle Communications Network Integrity 7.3.6 All All All
Application Oracle Hospitality Token Proxy Service 19.2 All All All
Application Oracle Retail Integration Bus 19.0.1 All All All
Application Oracle Retail Order Broker 16.0 All All All
Application Oracle Retail Service Backbone 19.0.1 All All All
Application Oracle Retail Xstore Office Cloud Service 16.0.6 All All All
Application Oracle Retail Xstore Office Cloud Service 17.0.4 All All All
Application Oracle Retail Xstore Office Cloud Service 18.0.3 All All All
Application Oracle Retail Xstore Office Cloud Service 19.0.2 All All All
Application Oracle Retail Xstore Office Cloud Service 20.0.1 All All All
Application Oracle Utilities Testing Accelerator 6.0.0.1.1 All All All
Application Oracle Utilities Testing Accelerator 6.0.0.2.2 All All All
Application Oracle Utilities Testing Accelerator 6.0.0.3.1 All All All

References

ReferenceSourceLinkTags
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org Mailing List, Vendor Advisory
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
Oracle Critical Patch Update Advisory - April 2022 MISC www.oracle.com
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! lists.apache.org
oss-security - CVE-2020-13936: Velocity Sandbox Bypass MLIST www.openwall.com Mailing List, Third Party Advisory
Pony Mail! lists.apache.org
Oracle Critical Patch Update Advisory - January 2022 MISC www.oracle.com
Pony Mail! CONFIRM lists.apache.org Mailing List, Vendor Advisory
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org Mailing List, Vendor Advisory
Pony Mail! MLIST lists.apache.org Mailing List, Patch, Vendor Advisory
Pony Mail! lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
Apache Velocity: Multiple vulnerabilities (GLSA 202107-52) — Gentoo security GENTOO security.gentoo.org
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
[SECURITY] [DLA 2595-1] velocity security update MLIST lists.debian.org
Pony Mail! lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! lists.apache.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

Discovery Credit

LEGACY: This issue was discovered by Alvaro Munoz [email protected] of Github Security Labs and was originally reported as GHSL-2020-048.

Legacy QID Mappings

  • 174799 SUSE Enterprise Linux Security update for velocity (SUSE-SU-2021:0800-1)
  • 178493 Debian Security Update for velocity (DLA 2595-1)
  • 199646 Ubuntu Security Notification for Velocity Engine Vulnerability (USN-6281-1)
  • 239353 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.7 (RHSA-2021:2048)
  • 239354 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.7 (RHSA-2021:2047)
  • 239355 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.7 (RHSA-2021:2046)
  • 239652 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.4.1 (RHSA-2021:3658)
  • 239653 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.4.1 (RHSA-2021:3656)
  • 352484 Amazon Linux Security Advisory for velocity: ALAS2-2021-1690
  • 670217 EulerOS Security Update for velocity (EulerOS-SA-2021-1858)
  • 670409 EulerOS Security Update for velocity (EulerOS-SA-2021-1990)
  • 670475 EulerOS Security Update for velocity (EulerOS-SA-2021-2233)
  • 670679 EulerOS Security Update for velocity (EulerOS-SA-2021-2437)
  • 710043 Gentoo Linux Apache Velocity Multiple Vulnerabilities (GLSA 202107-52)
  • 750303 OpenSUSE Security Update for velocity (openSUSE-SU-2021:0447-1)
  • 753357 SUSE Enterprise Linux Security Update for snakeyaml (SUSE-SU-2022:3397-1)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report