org.apache.archiva:archiva@1.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.archiva:archiva package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Incorrect Authorization

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Incorrect Authorization. An attacker can modify unspecified account data, leading to account takeover.

Note: This project is retired so no official fix is expected.

How to fix Incorrect Authorization?

There is no fixed version for org.apache.archiva:archiva.

[,2.0.0]
  • M
Information Exposure

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Information Exposure such that if anonymous read is enabled, it's possible to read the database file directly without logging in.

How to fix Information Exposure?

There is no fixed version for org.apache.archiva:archiva.

[0,)
  • H
Authentication Bypass

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Authentication Bypass. An attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.

How to fix Authentication Bypass?

Upgrade org.apache.archiva:archiva to version 2.2.5 or higher.

[,2.2.5)
  • M
Arbitrary File Write

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Arbitrary File Write. It is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files could be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.

How to fix Arbitrary File Write?

Upgrade org.apache.archiva:archiva to version 2.2.4 or higher.

[1.0.0,2.2.4)
  • M
Cross-site Scripting (XSS)

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was possible to store malicious XSS code into central configuration entries, i.e. the logo URL.

Note: Only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.archiva:archiva to version 2.2.4 or higher.

[,2.2.4)
  • H
Cross-site Request Forgery (CSRF)

Affected versions of org.apache.archiva:archiva are vulnerable to Cross-site Request Forgery (CSRF). Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.archiva:archiva to version 2.2.3 or higher.

[,2.2.3)
  • M
Cross-site Scripting (XSS)

org.apache.archiva:archiva Cross-site Scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.

[,1.3.9]
  • M
Cross-site Scripting (XSS)

org.apache.archiva:archiva Cross-site Scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table.

[,1.3.4)
  • M
Cross-site Request Forgery (CSRF)

org.apache.archiva:archiva Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.

[1.1,1.3.4]
  • M
Cross-site Scripting (XSS)

org.apache.archiva:archiva Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

[1.1,1.3.4]