org.apache.jena:jena-arq@3.3.0 vulnerabilities

  • latest version

    5.2.0

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.jena:jena-arq package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

    org.apache.jena:jena-arq is a SPARQL 1.1 query engine for Apache Jena.

    Affected versions of this package are vulnerable to Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') due to insufficient validation of user queries when invoking custom scripts. Exploiting this vulnerability allows a remote user to execute arbitrary javascript via a SPARQL query.

    How to fix Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')?

    Upgrade org.apache.jena:jena-arq to version 4.8.0 or higher.

    [,4.8.0)
    • H
    XML External Entity (XXE) Injection

    org.apache.jena:jena-arq is a SPARQL 1.1 query engine for Apache Jena.

    Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. A vulnerability in XML processing in Apache Jena may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.

    How to fix XML External Entity (XXE) Injection?

    Upgrade org.apache.jena:jena-arq to version 4.2.0 or higher.

    [,4.2.0)