com.xuxueli:xxl-job-core@2.3.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.xuxueli:xxl-job-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Neutralization of Special Elements Used in a Template Engine

com.xuxueli:xxl-job-core is a distributed task scheduling framework.

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements Used in a Template Engine via the deserialize() function in JdkSerializeTool.java, which accesses templates on the classpath with freemarker. An attacker in control of spring.freemarker.templateLoaderPath can inject a template to execute code when a given page is accessed.

How to fix Improper Neutralization of Special Elements Used in a Template Engine?

Upgrade com.xuxueli:xxl-job-core to version 2.4.1 or higher.

[0,2.4.1)
  • H
Command Injection

com.xuxueli:xxl-job-core is a distributed task scheduling framework.

Affected versions of this package are vulnerable to Command Injection via the background tasks due to improper input validation.

Note: This vulnerability doesn't have enough evidence for its exploitability.

How to fix Command Injection?

There is no fixed version for com.xuxueli:xxl-job-core.

[0,)
  • M
Cross-site Request Forgery (CSRF)

com.xuxueli:xxl-job-core is a distributed task scheduling framework.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) which may allow modifying a user's password.

How to fix Cross-site Request Forgery (CSRF)?

There is no fixed version for com.xuxueli:xxl-job-core.

[0,)