org.jolokia:jolokia-core@1.4.0 vulnerabilities

  • latest version

    1.7.2

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    2 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.jolokia:jolokia-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Cross-Site Request Forgery (CSRF)

    org.jolokia:jolokia-core is a jar file containing servlet and helper classes.

    Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) due to a lack of CORS hardening. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.

    How to fix Cross-Site Request Forgery (CSRF)?

    Upgrade org.jolokia:jolokia-core to version 1.6.1 or higher.

    [1.2.0,1.6.1)
    • H
    Arbitrary Code Execution

    org.jolokia:jolokia-core is a fresh way to access JMX MBeans remotely.

    Affected versions oft his package are vulnerable to Arbitrary Code Execution in the proxy mode. It allows a remote attacker to run arbitrary Java code on the server.

    How to fix Arbitrary Code Execution?

    Upgrade org.jolokia:jolokia-core to version 1.5.0 or higher.

    [,1.5.0)
    • M
    Cross-site Scripting (XSS)

    org.jolokia:jolokia-core is a fresh way to access JMX MBeans remotely.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the HTTP servlet. It allows an attacker to execute malicious javascript in the victim's browser.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.jolokia:jolokia-core to version 1.5.0 or higher.

    [,1.5.0)