org.apache.geode:geode-pulse@1.0.0-incubating vulnerabilities

  • latest version

    1.15.1

  • latest non vulnerable version

  • first published

    8 years ago

  • latest version published

    2 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.geode:geode-pulse package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via data injection when using Pulse web application to view Region entries, due to improper user-input sanitization.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.geode:geode-pulse to version 1.15.1 or higher.

    [,1.15.1)
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via data injection into the Geode database where injected payload gets executed on the Pulse web application when the admin querying data from Geode.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.geode:geode-pulse to version 1.15.1 or higher.

    [0,1.15.1)
    • H
    Information Exposure

    Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager property, allows remote authenticated users with CLUSTER:READ but not DATA:READ permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster.

    How to fix Information Exposure?

    Upgrade org.apache.geode:geode-pulse to version 1.1.1 or higher.

    [,1.1.1)