CVE-2020-1961: Injection in Apache Syncope
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.91079%
CWE
Published
6/16/2021
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.syncope:syncope-core | maven | >= 2.0.0, < 2.0.15 | 2.0.15 |
org.apache.syncope:syncope-core | maven | >= 2.1.0, < 2.1.6 | 2.1.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on JEXL injection in mail templates. Key indicators:
- The advisory explicitly calls out JEXL expression evaluation as the attack vector
- Syncope's architecture uses JEXL for template processing across multiple components
- Previous similar CVEs (CVE-2014-0111) involved JEXL evaluation in provisioning logic
- Mail template processing would require a rendering function combining user input with JEXL evaluation
While exact patch details are unavailable, the MailUtils.render function is the most probable candidate based on Syncope's architecture and vulnerability patterns. FlowableRuntimeUtils is included as secondary due to shared expression evaluation patterns, though with lower confidence.