org.apache.myfaces.core:myfaces-core-project@2.1.8 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.myfaces.core:myfaces-core-project package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Request Forgery (CSRF)

org.apache.myfaces.core:myfaces-core-project is a MyFaces implementation of the JavaServer Faces 2.3 specification, and consists of an API module (javax.faces.* classes) and an implementation module (org.apache.myfaces.* classes).

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). In the default configuration, Apache MyFaces Core uses cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.myfaces.core:myfaces-core-project to version 2.0.25, 2.2.14, 2.3.8, 2.3-next-M5, 3.0.0 or higher.

[,2.0.25) [2.1.0,2.2.14) [2.3.0,2.3.8) [2.3-next-M1,2.3-next-M5) [3.0.0-RC1,3.0.0)
  • C
Deserialization of Untrusted Data

Affected versions of org.apache.myfaces.core:myfaces-core-project are vulnerable to Deserialization of Untrusted Data.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.myfaces.core:myfaces-core-project to version 2.3.0 or higher.

[,2.3.0)