Arbitrary Code Execution Affecting org.apache.syncope:syncope-core package, versions [1.2.0, 1.2.11) [2.0.0, 2.0.8)


0.0
high
  • Exploit Maturity

    Proof of concept

  • Attack Complexity

    Low

  • Privileges Required

    High

  • Confidentiality

    High

  • Integrity

    High

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHESYNCOPE-32140

  • published

    21 Mar 2018

  • disclosed

    20 Mar 2018

  • credit

    Unknown

How to fix?

Upgrade org.apache.syncope:syncope-core to version 1.2.11, 2.0.8 or higher.

Overview

org.apache.syncope:syncope-core is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license.

Affected versions of this package are vulnerable to Arbitrary Code Execution. An administrator with report and template entitlements can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.