org.apache.archiva:archiva@2.1.1 vulnerabilities

  • latest version

    2.2.10

  • first published

    16 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.archiva:archiva package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Access Restriction Bypass

    org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

    Affected versions of this package are vulnerable to Access Restriction Bypass that allows unauthorized users to register when registration is set to be disabled.

    Note: This project is retired so no official fix is expected.

    How to fix Access Restriction Bypass?

    There is no fixed version for org.apache.archiva:archiva.

    [2.0.0,)
    • M
    Cross-site Scripting (XSS)

    org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when unspecified malicious characters are included in URLs.

    Note: This project is retired so no official fix is expected.

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for org.apache.archiva:archiva.

    [2.0.0,)
    • M
    Information Exposure

    org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

    Affected versions of this package are vulnerable to Information Exposure such that if anonymous read is enabled, it's possible to read the database file directly without logging in.

    How to fix Information Exposure?

    There is no fixed version for org.apache.archiva:archiva.

    [0,)
    • H
    Authentication Bypass

    org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

    Affected versions of this package are vulnerable to Authentication Bypass. An attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.

    How to fix Authentication Bypass?

    Upgrade org.apache.archiva:archiva to version 2.2.5 or higher.

    [,2.2.5)
    • M
    Arbitrary File Write

    org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

    Affected versions of this package are vulnerable to Arbitrary File Write. It is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files could be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.

    How to fix Arbitrary File Write?

    Upgrade org.apache.archiva:archiva to version 2.2.4 or higher.

    [1.0.0,2.2.4)
    • M
    Cross-site Scripting (XSS)

    org.apache.archiva:archiva is a repository management software that helps taking care of your own personal or enterprise-wide build artifact repository.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was possible to store malicious XSS code into central configuration entries, i.e. the logo URL.

    Note: Only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.archiva:archiva to version 2.2.4 or higher.

    [,2.2.4)
    • H
    Cross-site Request Forgery (CSRF)

    Affected versions of org.apache.archiva:archiva are vulnerable to Cross-site Request Forgery (CSRF). Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade org.apache.archiva:archiva to version 2.2.3 or higher.

    [,2.2.3)