org.apache.archiva:archiva@1.4-M1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.archiva:archiva package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Information Exposure such that if anonymous read is enabled, it's possible to read the database file directly without logging in.

How to fix Information Exposure?

There is no fixed version for org.apache.archiva:archiva.

[0,)
  • H
Authentication Bypass

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Authentication Bypass. An attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.

How to fix Authentication Bypass?

Upgrade org.apache.archiva:archiva to version 2.2.5 or higher.

(,2.2.5)
  • M
Arbitrary File Write

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Arbitrary File Write. It is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files could be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.

How to fix Arbitrary File Write?

Upgrade org.apache.archiva:archiva to version 2.2.4 or higher.

[1.0.0,2.2.4)
  • M
Cross-site Scripting (XSS)

org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was possible to store malicious XSS code into central configuration entries, i.e. the logo URL.

Note: Only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.archiva:archiva to version 2.2.4 or higher.

(,2.2.4)
  • H
Cross-site Request Forgery (CSRF)

Affected versions of org.apache.archiva:archiva are vulnerable to Cross-site Request Forgery (CSRF). Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.archiva:archiva to version 2.2.3 or higher.

(,2.2.3)