org.apache.geode:geode-pulse@1.0.0-incubating vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.geode:geode-pulse package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via data injection when using Pulse web application to view Region entries, due to improper user-input sanitization.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.geode:geode-pulse to version 1.15.1 or higher.

[,1.15.1)
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via data injection into the Geode database where injected payload gets executed on the Pulse web application when the admin querying data from Geode.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.geode:geode-pulse to version 1.15.1 or higher.

[0,1.15.1)
  • H
Information Exposure

Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager property, allows remote authenticated users with CLUSTER:READ but not DATA:READ permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster.

How to fix Information Exposure?

Upgrade org.apache.geode:geode-pulse to version 1.1.1 or higher.

[,1.1.1)