1.7.2
13 years ago
2 years ago
Known vulnerabilities in the org.jolokia:jolokia-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.jolokia:jolokia-core is a jar file containing servlet and helper classes. Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) due to a lack of CORS hardening. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack. How to fix Cross-Site Request Forgery (CSRF)? Upgrade | [1.2.0,1.6.1) |
org.jolokia:jolokia-core is a fresh way to access JMX MBeans remotely. Affected versions oft his package are vulnerable to Arbitrary Code Execution in the proxy mode. It allows a remote attacker to run arbitrary Java code on the server. How to fix Arbitrary Code Execution? Upgrade | [,1.5.0) |
org.jolokia:jolokia-core is a fresh way to access JMX MBeans remotely. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the HTTP servlet. It allows an attacker to execute malicious javascript in the victim's browser. How to fix Cross-site Scripting (XSS)? Upgrade | [,1.5.0) |