Vulnerability Description
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
CVSS Score
8.8
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonatype | Nexus | < 3.21.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-RPatchThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-ExExploitThird Party AdvisoryVDB Entry
- https://cwe.mitre.org/data/definitions/917.htmlThird Party Advisory
- https://support.sonatype.com/hc/en-us/articles/360044882533PatchVendor Advisory
- http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-RPatchThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-ExExploitThird Party AdvisoryVDB Entry
- https://cwe.mitre.org/data/definitions/917.htmlThird Party Advisory
- https://support.sonatype.com/hc/en-us/articles/360044882533PatchVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-US Government Resource
FAQ
What is CVE-2020-10199?
CVE-2020-10199 is a vulnerability with a CVSS score of 8.8 (HIGH). Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
How severe is CVE-2020-10199?
CVE-2020-10199 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-10199?
Check the references section above for vendor advisories and patch information. Affected products include: Sonatype Nexus.