org.apache.uima:uimaj-core@3.0.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.uima:uimaj-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Deserialization of Untrusted Data

org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the CasIOUtils class. An attacker can execute arbitrary code by deserializing unverified Java objects. This is only exploitable if the user or developer has actively chosen to start a service that is remotely accessible, such as Vinci, or if they use the CasIOUtils in their own applications and services to parse untrusted serialized CAS data.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.uima:uimaj-core to version 3.5.0 or higher.

[,3.5.0)
  • M
Directory Traversal

org.apache.uima:uimaj-core is a core implementation of the UIMA Java Framework.

Affected versions of this package are vulnerable to Directory Traversal due to allowing an attacker to create files outside the designated target directory using carefully crafted ZIP entry names.

Note:

PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.

How to fix Directory Traversal?

Upgrade org.apache.uima:uimaj-core to version 3.3.1 or higher.

[,3.3.1)