Search criteria
3 vulnerabilities found for Apache Jena Fuseki by Apache Software Foundation
JVNDB-2025-000054
Vulnerability from jvndb - Published: 2025-07-30 14:17 - Updated:2025-07-30 14:17
Severity ?
Summary
Apache Jena Fuseki vulnerable to path traversal
Details
Jena Fuseki provided by The Apache Software Foundation contains the following vulnerability.
- Path traversal (CWE-22) - CVE-2025-49656
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000054.html",
"dc:date": "2025-07-30T14:17+09:00",
"dcterms:issued": "2025-07-30T14:17+09:00",
"dcterms:modified": "2025-07-30T14:17+09:00",
"description": "Jena Fuseki provided by The Apache Software Foundation contains the following vulnerability.\r\n\u003cul\u003e\u003cli\u003ePath traversal (CWE-22) - CVE-2025-49656\u003c/li\u003e\u003c/ul\u003e\r\nNoriaki Iwasaki of Cyber Defense Institute, Inc. reported this vulnerability to the developer and IPA.\r\nAfter the coordination between the reporter and the developer, JPCERT/CC coordinated with the developer to publish this advisory under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000054.html",
"sec:cpe": {
"#text": "cpe:/a:apache:jena_fuseki",
"@product": "Apache Jena Fuseki",
"@vendor": "Apache Software Foundation",
"@version": "2.2"
},
"sec:cvss": {
"@score": "2.7",
"@severity": "Low",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2025-000054",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN90566559/index.html",
"@id": "JVN#90566559",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-49656",
"@id": "CVE-2025-49656",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2025-49656",
"@id": "CVE-2025-49656",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-22",
"@title": "Path Traversal(CWE-22)"
}
],
"title": "Apache Jena Fuseki vulnerable to path traversal"
}
CVE-2021-33192 (GCVE-0-2021-33192)
Vulnerability from cvelistv5 – Published: 2021-07-05 09:15 – Updated: 2024-08-03 23:42
VLAI?
Title
Display information UI XSS
Summary
A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive).
Severity ?
No CVSS data available.
CWE
- CWE-79 - type 0 and type 2.
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Jena Fuseki |
Affected:
Apache Jena Fuseki2 2.0.0 to 4.0.0
|
Credits
Apache Jena would like to thank Luka Safonov for reporting this issue.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:42:20.271Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache Jena Fuseki",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "Apache Jena Fuseki2 2.0.0 to 4.0.0"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Apache Jena would like to thank Luka Safonov for reporting this issue."
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive)."
}
],
"metrics": [
{
"other": {
"content": {
"other": "Medium"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79, type 0 and type 2.",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-05T09:15:11",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Display information UI XSS",
"workarounds": [
{
"lang": "en",
"value": "Users are advised to upgrade to Apache Jena 4.1.0 or later."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-33192",
"STATE": "PUBLIC",
"TITLE": "Display information UI XSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Jena Fuseki",
"version": {
"version_data": [
{
"version_name": "Apache Jena Fuseki2",
"version_value": "2.0.0 to 4.0.0"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Apache Jena would like to thank Luka Safonov for reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive)."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{
"other": "Medium"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79, type 0 and type 2."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"
}
]
},
"source": {
"discovery": "UNKNOWN"
},
"work_around": [
{
"lang": "en",
"value": "Users are advised to upgrade to Apache Jena 4.1.0 or later."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2021-33192",
"datePublished": "2021-07-05T09:15:11",
"dateReserved": "2021-05-19T00:00:00",
"dateUpdated": "2024-08-03T23:42:20.271Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-33192 (GCVE-0-2021-33192)
Vulnerability from nvd – Published: 2021-07-05 09:15 – Updated: 2024-08-03 23:42
VLAI?
Title
Display information UI XSS
Summary
A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive).
Severity ?
No CVSS data available.
CWE
- CWE-79 - type 0 and type 2.
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Jena Fuseki |
Affected:
Apache Jena Fuseki2 2.0.0 to 4.0.0
|
Credits
Apache Jena would like to thank Luka Safonov for reporting this issue.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:42:20.271Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache Jena Fuseki",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "Apache Jena Fuseki2 2.0.0 to 4.0.0"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Apache Jena would like to thank Luka Safonov for reporting this issue."
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive)."
}
],
"metrics": [
{
"other": {
"content": {
"other": "Medium"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79, type 0 and type 2.",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-05T09:15:11",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Display information UI XSS",
"workarounds": [
{
"lang": "en",
"value": "Users are advised to upgrade to Apache Jena 4.1.0 or later."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-33192",
"STATE": "PUBLIC",
"TITLE": "Display information UI XSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Jena Fuseki",
"version": {
"version_data": [
{
"version_name": "Apache Jena Fuseki2",
"version_value": "2.0.0 to 4.0.0"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Apache Jena would like to thank Luka Safonov for reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive)."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{
"other": "Medium"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79, type 0 and type 2."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"
}
]
},
"source": {
"discovery": "UNKNOWN"
},
"work_around": [
{
"lang": "en",
"value": "Users are advised to upgrade to Apache Jena 4.1.0 or later."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2021-33192",
"datePublished": "2021-07-05T09:15:11",
"dateReserved": "2021-05-19T00:00:00",
"dateUpdated": "2024-08-03T23:42:20.271Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}