This is an automated email from the ASF dual-hosted git repository. wglass pushed a commit to branch security-news-update in repository https://gitbox.apache.org/repos/asf/velocity-site.git
commit a3096bb25b2aebf1ebdefeba8eafc8cd7593277f Author: Will Glass-Husain <[email protected]> AuthorDate: Tue Mar 9 23:19:02 2021 -0800 CVE announcement --- src/content/news.xml | 49 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+) diff --git a/src/content/news.xml b/src/content/news.xml index a6b8960..b775d03 100644 --- a/src/content/news.xml +++ b/src/content/news.xml @@ -2,6 +2,55 @@ <news xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://velocity.apache.org/NEWS/1.0.0" xsi:schemaLocation="http://velocity.apache.org/NEWS/1.0.0 http://velocity.apache.org/site/tools/velocity-site-news/xsd/news-1.0.0.xsd"> <items> + <item id="CVE-2020-13936"> + <date>2021-03-09</date> + <headline>Security Advisory for Velocity Engine - Velocity Sandbox Bypass - CVE-2020-13936</headline> + <categories> + <category>velocity</category> + <category>engine</category> + </categories> + <text><![CDATA[ + PROBLEM: + + An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2. + + This issue has been assigned CVE-2020-13936. + + WORKAROUND: + + Applications using Apache Velocity that allow untrusted users to upload templates should upgrade to version 2.3. This version adds additional default restrictions on what methods/properties can be accessed in a template. + + ACKNOWLEDGEMENTS: + This issue was discovered by Alvaro Munoz [email protected] of Github Security Labs and was originally reported as GHSL-2020-048. + ]]></text> + </item> + + <item id="CVE-2020-13959"> + <date>2021-03-09</date> + <headline>Security Advisory for Velocity tools - XSS Vulnerability - CVE-2020-13959</headline> + <categories> + <category>velocity</category> + <category>tools</category> + </categories> + <text><![CDATA[ + PROBLEM: + + The default error page for VelocityView reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. + + XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks. + + This issue has been assigned CVE-2020-13959. + + WORKAROUND: + + Applications based on Apache Velocity Tools should upgrade to version 3.1. This version escapes the reflected text on the default error page, preventing potential javascript execution. + + ACKNOWLEDGEMENTS: + + This issue was reported and a patch was submitted by Jackson Henry, member of Sakura Samurai. + ]]></text> + </item> + <item id="tools31"> <date>2021-02-27</date> <headline>Velocity Tools 3.1 released</headline>
