org.apache.myfaces.core:myfaces-core-project@2.3-next-M2 vulnerabilities

  • latest version

    4.1.1

  • latest non vulnerable version

  • first published

    19 years ago

  • latest version published

    7 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.myfaces.core:myfaces-core-project package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Request Forgery (CSRF)

    org.apache.myfaces.core:myfaces-core-project is a MyFaces implementation of the JavaServer Faces 2.3 specification, and consists of an API module (javax.faces.* classes) and an implementation module (org.apache.myfaces.* classes).

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). In the default configuration, Apache MyFaces Core uses cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade org.apache.myfaces.core:myfaces-core-project to version 2.0.25, 2.2.14, 2.3.8, 2.3-next-M5, 3.0.0 or higher.

    [,2.0.25)[2.1.0,2.2.14)[2.3.0,2.3.8)[2.3-next-M1,2.3-next-M5)[3.0.0-RC1,3.0.0)