org.apache.jena:jena-arq@2.9.4 vulnerabilities

  • latest version

    5.0.0

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.apache.jena:jena-arq package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

org.apache.jena:jena-arq is a SPARQL 1.1 query engine for Apache Jena.

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') due to insufficient validation of user queries when invoking custom scripts. Exploiting this vulnerability allows a remote user to execute arbitrary javascript via a SPARQL query.

How to fix Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')?

Upgrade org.apache.jena:jena-arq to version 4.8.0 or higher.

[,4.8.0)
  • H
XML External Entity (XXE) Injection

org.apache.jena:jena-arq is a SPARQL 1.1 query engine for Apache Jena.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. A vulnerability in XML processing in Apache Jena may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.jena:jena-arq to version 4.2.0 or higher.

[,4.2.0)