org.apache.uima:uimaj-core@2.4.1 vulnerabilities

  • latest version

    3.6.0

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.uima:uimaj-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Deserialization of Untrusted Data

    org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the CasIOUtils class. An attacker can execute arbitrary code by deserializing unverified Java objects. This is only exploitable if the user or developer has actively chosen to start a service that is remotely accessible, such as Vinci, or if they use the CasIOUtils in their own applications and services to parse untrusted serialized CAS data.

    How to fix Deserialization of Untrusted Data?

    Upgrade org.apache.uima:uimaj-core to version 3.5.0 or higher.

    [,3.5.0)
    • M
    Directory Traversal

    org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework.

    Affected versions of this package are vulnerable to Directory Traversal due to allowing an attacker to create files outside the designated target directory using carefully crafted ZIP entry names.

    Note:

    PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.

    How to fix Directory Traversal?

    Upgrade org.apache.uima:uimaj-core to version 3.3.1 or higher.

    [,3.3.1)
    • M
    XML External Entity (XXE) Injection

    org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework.

    Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. As part of its configuration and operation, UIMA may read XML from various sources. An attacker may craft malicious XML file which could inadvertently disclose local files or other internal content.

    How to fix XML External Entity (XXE) Injection?

    Upgrade org.apache.uima:uimaj-core to version 2.10.2, 3.0.0-beta or higher.

    [,2.10.2)[3.0.0-alpha,3.0.0-beta)