org.lucee:lucee@5.3.8.206

  • latest version

    7.0.2.106

  • first published

    10 years ago

  • latest version published

    18 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.lucee:lucee package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Expired Pointer Dereference

    org.lucee:lucee is a Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development.

    Affected versions of this package are vulnerable to Expired Pointer Dereference via the scheduled task process. An authenticated attacker with an access to administrative interface can execute arbitrary code on the server by configuring a scheduled job to fetch a malicious .cfm file from a remote server, which is then written to the webroot and executed with the privileges of the service account.

    How to fix Expired Pointer Dereference?

    There is no fixed version for org.lucee:lucee.

    [5.0.0.2,)
    • C
    XML External Entity (XXE) Injection

    org.lucee:lucee is a Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development.

    Affected versions of this package are vulnerable to XML External Entity (XXE) Injection in its REST endpoint. An attacker can execute code by supplying malicious XML data.

    How to fix XML External Entity (XXE) Injection?

    Upgrade org.lucee:lucee to version 5.3.7.59, 5.3.12.1, 5.4.3.2 or higher.

    [,5.3.7.59)[5.3.8.132-RC,5.3.12.1)[5.4.0.65-RC,5.4.3.2)