4.2.0
10 years ago
3 months ago
Known vulnerabilities in the io.hawt:hawtio-system package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
io.hawt:hawtio-system is a hawtio package for creating a Java modular web console. Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) via the How to fix Arbitrary File Write via Archive Extraction (Zip Slip)? Upgrade | [,3.0-M7) |
io.hawt:hawtio-system is a hawtio package for creating a Java modular web console. Affected versions of this package are vulnerable to Directory Traversal that can lead to a NullPointerException with a full stacktrace. An attacker can use this to gather undisclosed information from within hawtio's root. How to fix Directory Traversal? Upgrade | [,1.5.0) |
io.hawt:hawtio-system is a hawtio package for creating a Java modular web console. Affected versions of this package are vulnerable to Information Exposure due to the usage of a single How to fix Information Exposure? Upgrade | [,1.5.0) |
io.hawt:hawtio-system is a hawtio package for creating a Java modular web console. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Multiple XSS issues exist within hawtio including the following areas:
How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
io.hawt:hawtio-system is a hawtio package for creating a Java modular web console. Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). It is possible for remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial How to fix Server-Side Request Forgery (SSRF)? Upgrade | [,2.5.0) |
io.hawt:hawtio-system is a lightweight and modular HTML5 web console with lots of plugins for managing your Java stuff. Affected versions of this package are vulnerable to Arbitrary Code Execution via file upload. An attacker could use this vulnerability to upload a crafted file which could be executed on a target machine where hawtio is deployed. How to fix Arbitrary Code Execution? Upgrade | [,1.5.5) |