com.orientechnologies:orientdb-core@2.0.10 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.orientechnologies:orientdb-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Arbitrary Command Injection

com.orientechnologies:orientdb-core is an Open Source Multi-Model NoSQL DBMS with the support of Native Graphs, Documents Full-Text, Reactivity, Geo-Spatial and Object Oriented concepts.

Affected versions of the package are vulnerable to Arbitrary Command Injection, as does not enforce privilege requirements during where, fetchplan or order by use, which allows remote attackers to execute arbitrary OS commands via a crafted request.

How to fix Arbitrary Command Injection?

Upgrade com.orientechnologies:orientdb-core to version 2.2.23 or higher.

[,2.2.23)
  • M
Insecure Randomness

com.orientechnologies:orientdb-core The OServer.java file is responsible for auto-generating passwords by using the variable new Random(). This is Java's default random-number generator initialized with the current system time as a seed, which is not secure because it is easily predictable. The SecureRandom random-number generator was used as a fix.

[,2.1.11)
  • H
Cross-site Request Forgery (CSRF)

com.orientechnologies:orientdb-core The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request.

[,2.0.15) [2.1.0,2.1.1)