org.apache.jackrabbit:jackrabbit-webapp@1.2.2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.jackrabbit:jackrabbit-webapp package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Deserialization of Untrusted Data

org.apache.jackrabbit:jackrabbit-webapp is a Web application that hosts and serves a Jackrabbit content repository.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the RMIVersions using the component commons-beanutils, which contains a class that can be used for remote code execution over RMI.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.jackrabbit:jackrabbit-webapp to version 2.20.11, 2.21.18 or higher.

[1.0.0,2.20.11) [2.21.0,2.21.18)
  • M
Cross-site Scripting (XSS)

org.apache.jackrabbit:jackrabbit-webapp is a Web application that hosts and serves a Jackrabbit content repository.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, by allowing remote attackers to inject arbitrary web script or HTML via the q parameter in thesearch.jspor swr.jsp files.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jackrabbit:jackrabbit-webapp to version 1.6.0 or higher.

[,1.6.0)
  • M
Cross-site Scripting (XSS)

org.apache.jackrabbit:jackrabbit-webapp is a Web application that hosts and serves a Jackrabbit content repository.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to not escaping the q parameter to search.jsp or swr.jsp.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jackrabbit:jackrabbit-webapp to version 1.5.2 or higher.

[,1.5.2)