org.apache.jena:jena-arq@4.7.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.jena:jena-arq package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

org.apache.jena:jena-arq is a SPARQL 1.1 query engine for Apache Jena.

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection'). There are insufficient restrictions of called script functions allowing a remote user to execute javascript via a SPARQL query.

How to fix Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')?

Upgrade org.apache.jena:jena-arq to version 4.9.0 or higher.

[3.7.0,4.9.0)
  • M
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

org.apache.jena:jena-arq is a SPARQL 1.1 query engine for Apache Jena.

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') due to insufficient validation of user queries when invoking custom scripts. Exploiting this vulnerability allows a remote user to execute arbitrary javascript via a SPARQL query.

How to fix Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')?

Upgrade org.apache.jena:jena-arq to version 4.8.0 or higher.

[,4.8.0)