[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2023-32200: Apache Jena: Exposure of execution in script engine expressions.
From: Andy Seaborne <andy () apache ! org>
Date: 2023-07-11 16:44:10
Message-ID: fefc8687-7f62-7ca4-361a-be7f0a3b0c74 () apache ! org
[Download RAW message or body]
Severity: important
Affected versions:
- Apache Jena 3.7.0 through 4.8.0
Description:
There is insufficient restrictions of called script functions in Apache Jena
versions 4.8.0 and earlier. It allows a
remote user to execute javascript via a SPARQL query.
This issue affects Apache Jena: from 3.7.0 through 4.8.0.
Credit:
s3gundo of Alibaba (reporter)
References:
https://www.cve.org/CVERecord?id=CVE-2023-22665
https://jena.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-32200
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic