org.apache.neethi:neethi@3.1.0

  • latest version

    3.2.2

  • latest non vulnerable version

  • first published

    19 years ago

  • latest version published

    27 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.neethi:neethi package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Infinite loop

    Affected versions of this package are vulnerable to Infinite loop when processing circular policy references. An attacker can cause denial of service by submitting malicious policy documents containing circular references.

    How to fix Infinite loop?

    Upgrade org.apache.neethi:neethi to version 3.2.2 or higher.

    [,3.2.2)
    • M
    Server-side Request Forgery (SSRF)

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the PolicyReference API when fetching remote policy references. An attacker can access internal resources or arbitrary protocols by supplying a crafted URI.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade org.apache.neethi:neethi to version 3.2.2 or higher.

    [,3.2.2)
    • H
    Allocation of Resources Without Limits or Throttling

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the normalization performed by the AbstractPolicyOperator class. An attacker can cause unbounded memory allocation and exhaust the JVM heap by submitting malicious WS-Policy documents that trigger exponential expansion when calculating policy alternatives.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.apache.neethi:neethi to version 3.2.2 or higher.

    [,3.2.2)