org.apache.syncope%3Asyncope-core@2.0.1 vulnerabilities

  • latest version

    3.0.6

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    5 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.apache.syncope%3Asyncope-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.apache.syncope:syncope is an Open Source system for managing digital identities in enterprise environments.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks. A malicious user with an administration entitlements could inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.syncope:syncope to versions 2.0.11, 2.1.2 or higher.

[,2.0.11) [2.1.0,2.1.2)
  • M
Information Exposure

org.apache.syncope:syncope-core is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license.

Affected versions of this package are vulnerable to Information Exposure. An administrator with user search entitlements can recover sensitive security values using the fiql and orderby parameters.

How to fix Information Exposure?

Upgrade org.apache.syncope:syncope-core to versions 1.2.11, 2.0.8 or higher.

[1.2.0,1.2.11) [2.0.0,2.0.8)
  • H
Arbitrary Code Execution

org.apache.syncope:syncope-core is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license.

Affected versions of this package are vulnerable to Arbitrary Code Execution. An administrator with report and template entitlements can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.

How to fix Arbitrary Code Execution?

Upgrade org.apache.syncope:syncope-core to version 1.2.11, 2.0.8 or higher.

[1.2.0,1.2.11) [2.0.0,2.0.8)