Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Execution vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for commons-jxpath:commons-jxpath
.
This was deemed not a vulnerability.
Affected versions of this package are vulnerable to Arbitrary Code Execution when interpreting untrusted XPath expressions. All JXPathContext class functions processing an XPath string are vulnerable except the compile()
and compilePath()
functions. The XPath expression can be used by an attacker to load any Java class from the classpath, resulting in code execution.
NOTE: This issue has been acknowledged as invalid as the library is NOT expected to handle untrusted input.