All the vulnerabilites related to apache - archiva
cve-2022-29405
Vulnerability from cvelistv5
Published
2022-05-25 07:15
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
References
▼ | URL | Tags |
---|---|---|
https://archiva.apache.org/docs/2.2.8/release-notes.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache Archiva |
Version: 2.2 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:55.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.2.7", "status": "affected", "version": "2.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8" } ], "problemTypes": [ { "descriptions": [ { "description": "Apache Archiva Arbitrary user password reset vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-25T07:15:11", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Archiva Arbitrary user password reset vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-29405", "STATE": "PUBLIC", "TITLE": "Apache Archiva Arbitrary user password reset vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "2.2", "version_value": "2.2.7" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ {} ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Apache Archiva Arbitrary user password reset vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://archiva.apache.org/docs/2.2.8/release-notes.html", "refsource": "MISC", "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-29405", "datePublished": "2022-05-25T07:15:11", "dateReserved": "2022-04-18T00:00:00", "dateUpdated": "2024-08-03T06:17:55.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2251
Vulnerability from cvelistv5
Published
2013-07-18 01:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "apache-archiva-ognl-command-exec(90392)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "name": "20131013 Apache Software Foundation A Subsite Remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "98445", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/98445" }, { "name": "1032916", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032916" }, { "name": "61189", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61189" }, { "name": "1029184", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029184" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:06:20", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "apache-archiva-ognl-command-exec(90392)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "name": "20131013 Apache Software Foundation A Subsite Remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "98445", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/98445" }, { "name": "1032916", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032916" }, { "name": "61189", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61189" }, { "name": "1029184", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029184" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2251", "datePublished": "2013-07-18T01:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2187
Vulnerability from cvelistv5
Published
2014-04-22 14:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/66991 | vdb-entry, x_refsource_BID | |
http://archiva.apache.org/security.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/531884/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id/1030130 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "66991", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20140419 [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "name": "1030130", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030130" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "66991", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20140419 [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "name": "1030130", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030130" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "66991", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66991" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "20140419 [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "name": "1030130", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030130" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2187", "datePublished": "2014-04-22T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1077
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:14
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/518167/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/44693 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67672 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html | mailing-list, x_refsource_FULLDISC | |
http://archiva.apache.org/security.html | x_refsource_CONFIRM | |
http://securityreason.com/securityalert/8267 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/48011 | vdb-entry, x_refsource_BID | |
http://archiva.apache.org/docs/1.3.5/release-notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110527 [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-xss(67672)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "name": "20110531 [CVE-2011-1077] Apache Archiva Multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "8267", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8267" }, { "name": "48011", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48011" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20110527 [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-xss(67672)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "name": "20110531 [CVE-2011-1077] Apache Archiva Multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "8267", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8267" }, { "name": "48011", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48011" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1077", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110527 [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "name": "44693", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-xss(67672)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "name": "20110531 [CVE-2011-1077] Apache Archiva Multiple XSS vulnerabilities", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "8267", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8267" }, { "name": "48011", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48011" }, { "name": "http://archiva.apache.org/docs/1.3.5/release-notes.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1077", "datePublished": "2011-06-02T20:00:00", "dateReserved": "2011-02-24T00:00:00", "dateUpdated": "2024-08-06T22:14:27.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0533
Vulnerability from cvelistv5
Published
2011-02-17 17:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "70925", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70925" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "name": "46311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46311" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43261" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "1025065", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025065" }, { "name": "20110216 [SECURITY] CVE-2011-0533: Apache Archiva cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12581", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "name": "8091", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8091" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "name": "ADV-2011-0426", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "name": "43334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43334" }, { "name": "continuum-unspec-xss(65343)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "name": "20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20110211 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "70925", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70925" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "name": "46311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46311" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43261" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "1025065", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025065" }, { "name": "20110216 [SECURITY] CVE-2011-0533: Apache Archiva cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12581", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "name": "8091", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8091" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "name": "ADV-2011-0426", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "name": "43334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43334" }, { "name": "continuum-unspec-xss(65343)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "name": "20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20110211 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0533", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "70925", "refsource": "OSVDB", "url": "http://osvdb.org/70925" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "name": "46311", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46311" }, { "name": "43261", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43261" }, { "name": "http://jira.codehaus.org/browse/CONTINUUM-2604", "refsource": "CONFIRM", "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360@apache.org%3E" }, { "name": "ADV-2011-0373", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "1025065", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025065" }, { "name": "20110216 [SECURITY] CVE-2011-0533: Apache Archiva cross-site scripting vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12581", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "name": "8091", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8091" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "name": "ADV-2011-0426", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "name": "43334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43334" }, { "name": "continuum-unspec-xss(65343)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "name": "20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "name": "http://continuum.apache.org/security.html", "refsource": "CONFIRM", "url": "http://continuum.apache.org/security.html" }, { "name": "20110211 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2011/Feb/236" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0533", "datePublished": "2011-02-17T17:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40309
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
Users with write permissions to a repository can delete arbitrary directories.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache Archiva |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" }, { "name": "[oss-security] 20221115 CVE-2022-40309: Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.2.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to L3yx of Syclover Security Team" } ], "descriptions": [ { "lang": "en", "value": "Users with write permissions to a repository can delete arbitrary directories." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary directory deletion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" }, { "name": "[oss-security] 20221115 CVE-2022-40309: Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-40309", "datePublished": "2022-11-15T00:00:00", "dateReserved": "2022-09-09T00:00:00", "dateUpdated": "2024-08-03T12:14:40.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5657
Vulnerability from cvelistv5
Published
2017-05-22 18:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).
References
▼ | URL | Tags |
---|---|---|
http://archiva.apache.org/security.html#CVE-2017-5657 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98570 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038528 | vdb-entry, x_refsource_SECTRACK | |
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache Archiva |
Version: 1.x Version: 2.0.0, 2.0.1 Version: 2.1.0, 2.1.1 Version: 2.2.0, 2.2.1, 2.2.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.x" }, { "status": "affected", "version": "2.0.0, 2.0.1" }, { "status": "affected", "version": "2.1.0, 2.1.1" }, { "status": "affected", "version": "2.2.0, 2.2.1, 2.2.2" } ] } ], "datePublic": "2017-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." } ], "problemTypes": [ { "descriptions": [ { "description": "Apache Archiva CSRF vulnerabilities for various REST endpoints", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T17:06:06", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5657", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "1.x" }, { "version_value": "2.0.0, 2.0.1" }, { "version_value": "2.1.0, 2.1.1" }, { "version_value": "2.2.0, 2.2.1, 2.2.2" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Apache Archiva CSRF vulnerabilities for various REST endpoints" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html#CVE-2017-5657", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-5657", "datePublished": "2017-05-22T18:00:00", "dateReserved": "2017-01-29T00:00:00", "dateUpdated": "2024-08-05T15:11:48.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3449
Vulnerability from cvelistv5
Published
2010-12-06 20:00
Modified
2024-08-07 03:11
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:11:44.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42376", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42376" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "name": "20110211 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "name": "45095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43261" }, { "name": "20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "name": "69520", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/69520" }, { "name": "ADV-2010-3098", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "1025066", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025066" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "42376", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42376" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "name": "20110211 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "name": "45095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43261" }, { "name": "20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "name": "69520", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/69520" }, { "name": "ADV-2010-3098", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "1025066", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025066" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42376", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42376" }, { "name": "http://jira.codehaus.org/browse/MRM-1438", "refsource": "CONFIRM", "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "name": "20110211 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "name": "45095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45095" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "name": "43261", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43261" }, { "name": "20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "name": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "ADV-2011-0373", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "name": "69520", "refsource": "OSVDB", "url": "http://www.osvdb.org/69520" }, { "name": "ADV-2010-3098", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2@mail.gmail.com%3E" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695@apache.org%3E" }, { "name": "http://continuum.apache.org/security.html", "refsource": "CONFIRM", "url": "http://continuum.apache.org/security.html" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "name": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "1025066", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025066" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3449", "datePublished": "2010-12-06T20:00:00", "dateReserved": "2010-09-17T00:00:00", "dateUpdated": "2024-08-07T03:11:44.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4469
Vulnerability from cvelistv5
Published
2016-07-28 16:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Jul/37 | mailing-list, x_refsource_FULLDISC | |
http://www.securitytracker.com/id/1036475 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/538877/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/91703 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/40109/ | exploit, x_refsource_EXPLOIT-DB | |
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036475" }, { "name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "name": "91703", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91703" }, { "name": "40109", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40109/" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T17:06:05", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036475" }, { "name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "name": "91703", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91703" }, { "name": "40109", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40109/" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "name": "1036475", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036475" }, { "name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "name": "91703", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91703" }, { "name": "40109", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40109/" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4469", "datePublished": "2016-07-28T16:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:25.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9495
Vulnerability from cvelistv5
Published
2020-06-19 18:59
Modified
2024-08-04 10:34
Severity ?
EPSS score ?
Summary
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
References
▼ | URL | Tags |
---|---|---|
http://archiva.apache.org/security.html#CVE-2020-9495 | x_refsource_MISC | |
https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2020/06/19/1 | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Apache Archiva |
Version: Apache Archiva 2.2.4 and below |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:34:38.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "name": "[maven-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-dev] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "name": "[archiva-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "name": "[announce] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache Archiva 2.2.4 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-20T01:06:11", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "name": "[maven-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-dev] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "name": "[archiva-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "name": "[announce] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2020-9495", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "Apache Archiva 2.2.4 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html#CVE-2020-9495", "refsource": "MISC", "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "name": "[maven-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-dev] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3E" }, { "name": "[archiva-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "name": "[announce] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2020-9495", "datePublished": "2020-06-19T18:59:20", "dateReserved": "2020-03-01T00:00:00", "dateUpdated": "2024-08-04T10:34:38.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5005
Vulnerability from cvelistv5
Published
2016-07-28 16:00
Modified
2024-08-06 00:46
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/538878/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id/1036475 | vdb-entry, x_refsource_SECTRACK | |
http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/91707 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2016/Jul/38 | mailing-list, x_refsource_FULLDISC | |
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:46:40.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160711 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036475" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "name": "91707", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91707" }, { "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T17:06:05", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20160711 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036475" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "name": "91707", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91707" }, { "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160711 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "name": "1036475", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036475" }, { "name": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "name": "91707", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91707" }, { "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5005", "datePublished": "2016-07-28T16:00:00", "dateReserved": "2016-05-24T00:00:00", "dateUpdated": "2024-08-06T00:46:40.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0213
Vulnerability from cvelistv5
Published
2019-04-30 21:35
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache | Apache Archiva |
Version: All versions prior to version 2.2.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108123" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache", "versions": [ { "status": "affected", "version": "All versions prior to version 2.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised." } ], "problemTypes": [ { "descriptions": [ { "description": "Stored XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-06T19:58:29", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108123" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "All versions prior to version 2.2.4" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stored XSS" } ] } ] }, "references": { "reference_data": [ { "name": "20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "name": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "name": "http://archiva.apache.org/security.html#CVE-2019-0213", "refsource": "MISC", "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E" }, { "name": "108123", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108123" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0213", "datePublished": "2019-04-30T21:35:47", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:14.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1026
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:14
Severity ?
EPSS score ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/8266 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/518168/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/44693 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67671 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/48015 | vdb-entry, x_refsource_BID | |
http://archiva.apache.org/security.html | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html | mailing-list, x_refsource_FULLDISC | |
http://archiva.apache.org/docs/1.3.5/release-notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8266", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8266" }, { "name": "20110527 [SECURITY] CVE-2011-1026: Apache Archiva Multiple CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-csrf(67671)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "name": "48015", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48015" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20110531 [CVE-2011-1026] Apache Archiva Multiple CSRF vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "8266", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8266" }, { "name": "20110527 [SECURITY] CVE-2011-1026: Apache Archiva Multiple CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-csrf(67671)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "name": "48015", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48015" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20110531 [CVE-2011-1026] Apache Archiva Multiple CSRF vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8266", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8266" }, { "name": "20110527 [SECURITY] CVE-2011-1026: Apache Archiva Multiple CSRF vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "name": "44693", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-csrf(67671)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "name": "48015", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48015" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "20110531 [CVE-2011-1026] Apache Archiva Multiple CSRF vulnerabilities", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "name": "http://archiva.apache.org/docs/1.3.5/release-notes.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1026", "datePublished": "2011-06-02T20:00:00", "dateReserved": "2011-02-14T00:00:00", "dateUpdated": "2024-08-06T22:14:27.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4408
Vulnerability from cvelistv5
Published
2010-12-06 20:00
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
References
▼ | URL | Tags |
---|---|---|
http://archiva.apache.org/security.html | x_refsource_CONFIRM | |
http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/archive/1/514937/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator\u0027s password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator\u0027s password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2@mail.gmail.com%3E" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4408", "datePublished": "2010-12-06T20:00:00", "dateReserved": "2010-12-06T00:00:00", "dateUpdated": "2024-08-07T03:43:14.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40308
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 12:14
Severity ?
EPSS score ?
Summary
If anonymous read enabled, it's possible to read the database file directly without logging in.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache Archiva |
Version: Apache Archiva < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" }, { "name": "[oss-security] 20221115 CVE-2022-40308: Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.2.8", "status": "affected", "version": "Apache Archiva", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to L3yx of Syclover Security Team" } ], "descriptions": [ { "lang": "en", "value": "If anonymous read enabled, it\u0027s possible to read the database file directly without logging in." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary file read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" }, { "name": "[oss-security] 20221115 CVE-2022-40308: Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-40308", "datePublished": "2022-11-15T00:00:00", "dateReserved": "2022-09-09T00:00:00", "dateUpdated": "2024-08-03T12:14:40.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0214
Vulnerability from cvelistv5
Published
2019-04-30 21:48
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache | Apache Archiva |
Version: All versions prior to version 2.2.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "name": "20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108124" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache", "versions": [ { "status": "affected", "version": "All versions prior to version 2.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary write/delete of files on the archiva server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-02T16:06:04", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "name": "20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108124" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0214", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "All versions prior to version 2.2.4" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary write/delete of files on the archiva server" } ] } ] }, "references": { "reference_data": [ { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E" }, { "name": "20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "name": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "name": "http://archiva.apache.org/security.html#CVE-2019-0214", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E" }, { "name": "108124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108124" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0214", "datePublished": "2019-04-30T21:48:54", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:14.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28158
Vulnerability from cvelistv5
Published
2023-03-29 12:21
Modified
2024-10-23 15:12
Severity ?
EPSS score ?
Summary
Privilege escalation via stored XSS using the file upload service to upload malicious content.
The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache Archiva |
Version: 2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:30:24.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T15:12:27.939865Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:12:35.785Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "2.2.10", "status": "affected", "version": "2.0", "versionType": "maven" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "sandr0 (sandr0.xyz) " } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-29T12:21:46.932Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" }, { "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Archiva privilege escalation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-28158", "datePublished": "2023-03-29T12:21:46.932Z", "dateReserved": "2023-03-13T02:37:38.879Z", "dateUpdated": "2024-10-23T15:12:35.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-04-30 22:29
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AB5FF1B-F9F2-458C-BFE7-BA144AE1CAF2", "versionEndExcluding": "2.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised." }, { "lang": "es", "value": "En Apache Archiva anterior a versi\u00f3n 2.2.4, puede ser posible almacenar c\u00f3digo XSS malicioso en entradas de configuraci\u00f3n central, es decir, la URL logo. La vulnerabilidad es considerada un riesgo menor, ya que solo los usuarios con rol de administrador pueden cambiar la configuraci\u00f3n, o la comunicaci\u00f3n entre el navegador y el servidor Archiva debe verse comprometida." } ], "id": "CVE-2019-0213", "lastModified": "2024-11-21T04:16:30.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-30T22:29:00.793", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108123" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-28 16:59
Modified
2024-11-21 02:53
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88C4882-5FEB-4EAC-9489-103BBB266638", "versionEndIncluding": "1.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Apache Archiva 1.3.9 y versiones anteriores permite a administradores remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro connector.sourceRepoId para admin/addProxyConnector_commit.action." } ], "id": "CVE-2016-5005", "lastModified": "2024-11-21T02:53:25.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-28T16:59:01.380", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91707" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-22 14:23
Modified
2024-11-21 01:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "19E4F29D-795C-4CE2-85CA-3322B1598F9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4803C6A2-1B9C-48E5-9495-15EA25176396", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "59818802-9A36-421C-B2C6-0AD8906A5BF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Apache Archiva 1.2 hasta 1.2.2 y 1.3 anterior a 1.3.8 permite a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s de par\u00e1metros no especificados, relacionado con la p\u00e1gina de inicio." } ], "id": "CVE-2013-2187", "lastModified": "2024-11-21T01:51:12.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-04-22T14:23:34.017", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/66991" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1030130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030130" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 20:13
Modified
2024-11-21 01:20
Severity ?
Summary
Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator\u0027s password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449." }, { "lang": "es", "value": "Apache Archiva 1.0 hasta la versi\u00f3n 1.0.3, 1.1 hasta la 1.1.4, 1.2 hasta la 1.2.2, y 1.3 hasta la 1.3.1 no requiere la entrada de la contrase\u00f1a de administrador al modificar una cuenta de usuario, lo que facilita a atacantes dependientes del contexto escalar privilegios a trav\u00e9s de (1) equipos desatentidos o (2) una vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF). Un asunto relacionado con CVE-2010-3449." } ], "id": "CVE-2010-4408", "lastModified": "2024-11-21T01:20:53.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-12-06T20:13:00.560", "references": [ { "source": "cve@mitre.org", "url": "http://archiva.apache.org/security.html" }, { "source": "cve@mitre.org", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 20:13
Modified
2024-11-21 01:18
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jesse_mcconnell | redback | * | |
jesse_mcconnell | redback | 1.0 | |
jesse_mcconnell | redback | 1.0 | |
jesse_mcconnell | redback | 1.0.1 | |
jesse_mcconnell | redback | 1.0.2 | |
jesse_mcconnell | redback | 1.0.3 | |
jesse_mcconnell | redback | 1.1 | |
jesse_mcconnell | redback | 1.1.1 | |
jesse_mcconnell | redback | 1.1.2 | |
jesse_mcconnell | redback | 1.2 | |
jesse_mcconnell | redback | 1.2 | |
jesse_mcconnell | redback | 1.2 | |
jesse_mcconnell | redback | 1.2.1 | |
jesse_mcconnell | redback | 1.2.2 | |
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:*:*:*:*:*:*:*:*", "matchCriteriaId": "39FE6A7B-7617-4482-B4B7-4069211BA2AA", "versionEndIncluding": "1.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1559A056-EBEA-44CE-BCE2-CC12EC5C0BF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "BD05018C-8159-4A78-AC7A-632B79E12E3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "42B97EE6-941F-477B-85CB-2DF3157E0748", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD23AC38-1D44-41E7-BFB0-E3F1629DC137", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0A19DB66-6636-460D-A081-F8CAB2882BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF7A373-CF78-438C-A7DC-3C363AD18A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "35C190A2-A099-44E1-85B7-E7BA47B29890", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "23C7C861-1CCF-49C1-B1B5-5B9058C3EE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE301F-877B-41DE-AFC7-ED649340AE4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "3E177652-1316-4F37-837D-912B4C43108F", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "6B8612CC-1978-4D42-9995-47A96BDEB502", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A949E134-1A33-4293-AB3E-1917CC9BCDCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9223BE71-E90C-4561-BEFC-81C37624FC13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Redback anterior a versi\u00f3n 1.2.4, tal y como es usado en Apache Archiva versiones 1.0 hasta 1.0.3, versiones 1.1 hasta 1.1.4, versiones 1.2 hasta 1.2.2, y versiones 1.3 hasta 1.3.1; y Apache Continuum versiones 1.3.6, 1.4.0 y versiones 1.1 hasta 1.2.3.1; permite a los atacantes remotos secuestrar la autenticaci\u00f3n de administradores para peticiones que modifican las credenciales." } ], "id": "CVE-2010-3449", "lastModified": "2024-11-21T01:18:45.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-12-06T20:13:00.357", "references": [ { "source": "secalert@redhat.com", "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://continuum.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42376" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43261" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/69520" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45095" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025066" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://continuum.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/69520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0373" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-30 22:29
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED5631C-7537-41E4-A174-0DE0259B2BFB", "versionEndIncluding": "1.3.9", "versionStartIncluding": "1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEC9D225-6ABA-49E5-A3DE-419032D259AF", "versionEndIncluding": "2.2.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file." }, { "lang": "es", "value": "En Apache Archiva versiones desde la 2.0.0 hasta la 2.2.3, es posible escribir archivos en archiva server, en ubicaciones arbitrarias utilizando el mecanismo artifact upload. Los archivos existentes pueden sobrescribirse, si el usuario de la ejecuci\u00f3n de archiva tiene el permiso apropiado en el sistema de archivos para el archivo de destino." } ], "id": "CVE-2019-0214", "lastModified": "2024-11-21T04:16:30.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-30T22:29:01.027", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108124" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-17 18:00
Modified
2024-11-21 01:24
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | continuum | 1.1 | |
apache | continuum | 1.2 | |
apache | continuum | 1.2.2 | |
apache | continuum | 1.2.3 | |
apache | continuum | 1.2.3.1 | |
apache | continuum | 1.3.6 | |
apache | continuum | 1.4.0 | |
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 | |
apache | archiva | 1.3.2 | |
apache | archiva | 1.3.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:continuum:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "117CA011-B3D9-4A0B-B9D4-3CCADA18C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B9378F8-FEE0-4044-BFDD-609B9EF63FC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "29D35B80-7257-4F31-95CE-4A5D246BB949", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "93FC5BC1-4022-433C-80A8-369F9658BB76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0189E53C-113E-4A38-8CAC-C0D536797AF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "1BBBB14F-9048-4D92-B712-2DB48FB0F54B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.4.0:beta:*:*:*:*:*:*", "matchCriteriaId": "94C2C439-588B-457F-B66C-577FC5DBAB5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en Continuum versiones 1.1 hasta 1.2.3.1, versiones 1.3.6 y 1.4.0 Beta; y Archiva versiones 1.3.0 hasta 1.3.3 y versiones 1.0 hasta 1.22 de Apache, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de un par\u00e1metro especialmente dise\u00f1ado, relacionado con la configuraci\u00f3n autoIncludeParameters para la tabla extremecomponents." } ], "id": "CVE-2011-0533", "lastModified": "2024-11-21T01:24:14.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-17T18:00:03.760", "references": [ { "source": "secalert@redhat.com", "url": "http://continuum.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/70925" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43261" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43334" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8091" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025065" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46311" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://continuum.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-28 16:59
Modified
2024-11-21 02:52
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88C4882-5FEB-4EAC-9489-103BBB266638", "versionEndIncluding": "1.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de CSRF en Apache Archiva 1.3.9 y versiones anteriores permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que (1) a\u00f1aden nuevos conectores de proxy del repositorio a trav\u00e9s del par\u00e1metro token para admin/addProxyConnector_commit.action, (2) nuevos repositorios a trav\u00e9s del par\u00e1metro token para admin/addRepository_commit.action, (3) editan repositorios existentes a trav\u00e9s del par\u00e1metro token para admin/editRepository_commit.action, (4) a\u00f1aden rutas de artefactos de legado a trav\u00e9s del par\u00e1metro token para admin/addLegacyArtifactPath_commit.action, (5) cambian la apariencia organizacional a trav\u00e9s del par\u00e1metro token para admin/saveAppearance.action o (6) suben nuevos artefactos a trav\u00e9s del par\u00e1metro token para upload_submit.action." } ], "id": "CVE-2016-4469", "lastModified": "2024-11-21T02:52:17.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-28T16:59:00.130", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91703" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/40109/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/40109/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:25
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2-m1 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 | |
apache | archiva | 1.3.2 | |
apache | archiva | 1.3.3 | |
apache | archiva | 1.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2-m1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF0EA32-14C3-4BB9-9779-E2089FAA2867", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "19E4F29D-795C-4CE2-85CA-3322B1598F9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados(CSRF) en Apache Archiva v1.0 a v1.2.2 y v1.3.x antes de v1.3.5, permiten a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores.\r\n" } ], "id": "CVE-2011-1026", "lastModified": "2024-11-21T01:25:21.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-02T20:55:02.263", "references": [ { "source": "secalert@redhat.com", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8266" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48015" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-25 08:15
Modified
2024-11-21 06:59
Severity ?
Summary
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | https://archiva.apache.org/docs/2.2.8/release-notes.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://archiva.apache.org/docs/2.2.8/release-notes.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1DAEB66-424F-4123-87DB-05EDA94632F2", "versionEndExcluding": "2.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8" }, { "lang": "es", "value": "En Apache Archiva, cualquier usuario registrado puede restablecer la contrase\u00f1a de cualquier usuario. Esto ha sido corregido en Archiva versi\u00f3n 2.2.8" } ], "id": "CVE-2022-29405", "lastModified": "2024-11-21T06:59:01.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-25T08:15:12.167", "references": [ { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-15 13:15
Modified
2024-11-21 07:21
Severity ?
Summary
Users with write permissions to a repository can delete arbitrary directories.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2022/11/15/3 | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27 | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/15/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27 | Issue Tracking, Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "76551255-460B-4761-99E7-CFC2BD3DF2BE", "versionEndExcluding": "2.2.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Users with write permissions to a repository can delete arbitrary directories." }, { "lang": "es", "value": "Los usuarios con permisos de escritura en un repositorio pueden eliminar directorios arbitrarios." } ], "id": "CVE-2022-40309", "lastModified": "2024-11-21T07:21:17.270", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-15T13:15:11.000", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-15 13:15
Modified
2024-11-21 07:21
Severity ?
Summary
If anonymous read enabled, it's possible to read the database file directly without logging in.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2022/11/15/2 | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/15/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc | Issue Tracking, Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "76551255-460B-4761-99E7-CFC2BD3DF2BE", "versionEndExcluding": "2.2.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If anonymous read enabled, it\u0027s possible to read the database file directly without logging in." }, { "lang": "es", "value": "Si la lectura an\u00f3nima est\u00e1 habilitada, es posible leer el archivo de la base de datos directamente sin iniciar sesi\u00f3n." } ], "id": "CVE-2022-40308", "lastModified": "2024-11-21T07:21:17.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-15T13:15:10.413", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-22 18:29
Modified
2024-11-21 03:28
Severity ?
Summary
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EFE650A-FEA8-4182-AC36-C9EB41C39EC2", "versionEndIncluding": "2.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." }, { "lang": "es", "value": "Varios endpoints de servicio REST de Apache Archiva no est\u00e1n protegidos contra ataques de tipo Cross Site Request Forgery (CSRF). Un sitio malicioso abierto en el mismo navegador que el sitio archiva puede enviar una respuesta HTML que ejecuta acciones arbitrarias en los servicios de archiva, con los mismos derechos que la sesi\u00f3n de archiva activa (por ejemplo, derechos de administrador)." } ], "id": "CVE-2017-5657", "lastModified": "2024-11-21T03:28:07.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-22T18:29:00.177", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98570" }, { "source": "security@apache.org", "url": "http://www.securitytracker.com/id/1038528" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-20 03:37
Modified
2024-11-27 16:07
Severity ?
Summary
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
Impacted products
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Improper Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A10FB76-761D-4411-B6A8-B1AD5C133071", "versionEndExcluding": "1.3.8", "versionStartIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:-:*:*:*:*:*:*", "matchCriteriaId": "F0E0751C-E0BD-4C33-A541-C6FC67CE6663", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C63F76-5AFE-4D2F-B81C-D3476C165227", "versionEndIncluding": "2.3.15", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D24308C-EEFB-477D-A88C-95E76CAC8AD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D0C7AB6-1B62-49E3-99F8-53DD9329264E", "versionEndIncluding": "6.10", "versionStartIncluding": "5.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2825C5B3-6495-43FE-9D87-750C8B9B25EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": false }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D0C7AB6-1B62-49E3-99F8-53DD9329264E", "versionEndIncluding": "6.10", "versionStartIncluding": "5.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp7000f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "577FACF4-0FB9-461A-877C-32DA8DBBF2B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp7000f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D55A60A2-B9F8-49CF-AD55-033942363704", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:primepower_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5392609-A095-40AA-8190-783B8CCFDB18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:primepower:-:*:*:*:*:*:*:*", "matchCriteriaId": "77300584-CABF-4332-8E1A-763048496818", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "931139C5-A9D3-4D63-AF15-B0C5DD0578D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "855CDB9B-5476-4765-A8E3-69C7D42E1DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:primergy_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78239AD8-F1E1-49F2-A89F-F8488F21C014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:primergy:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9091D4-FC2B-43DE-A8C5-87922034536F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp5000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "262CD533-5171-4AB0-9537-65FC5FBA195E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3BE416-DA1B-4168-BE30-DFE3CD84E4E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3177688-5BBE-4C19-8A5C-FCF76AE2B227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E1A333-794C-44BE-9E2A-C6711169681E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "109A2A5D-D631-472F-AA80-2E1D707943F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51D5BAC9-E5B1-4A19-8B87-0CA2FA046D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F0DBE55-667B-45EF-8C3A-9C7AA33ADDE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix." }, { "lang": "es", "value": "Apache Struts v2.0.0 hasta v2.3.15 permite a atacantes remotos ejecutar expresiones OGNL arbitrarias mediante un par\u00e1metro con una (1)acci\u00f3n:, (2) redirect:, o (3) redirectAction:" } ], "id": "CVE-2013-2251", "lastModified": "2024-11-27T16:07:37.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2013-07-20T03:37:30.737", "references": [ { "source": "secalert@redhat.com", "tags": [ "Product" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://osvdb.org/98445" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/61189" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029184" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032916" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/98445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/61189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-19 19:15
Modified
2024-11-21 05:40
Severity ?
Summary
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8213C5F-5C63-46A4-BC2A-168E62C04E01", "versionEndExcluding": "2.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects." }, { "lang": "es", "value": "El servicio de inicio de sesi\u00f3n de Apache Archiva versiones anteriores a 2.2.5, es vulnerable a una inyecci\u00f3n de LDAP. Un atacante es capaz de recuperar datos de atributos de usuario desde el servidor LDAP conectado al proporcionar valores especiales al formulario de inicio de sesi\u00f3n. Con determinados caracteres es posible modificar el filtro LDAP usado para consultar a los usuarios de LDAP. Al medir el tiempo de respuesta para la petici\u00f3n de inicio de sesi\u00f3n, pueden ser recuperados datos de atributos arbitrarios desde los objetos de usuario de LDAP" } ], "id": "CVE-2020-9495", "lastModified": "2024-11-21T05:40:46.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-19T19:15:12.887", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-29 13:15
Modified
2024-11-21 07:54
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Privilege escalation via stored XSS using the file upload service to upload malicious content.
The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "95454E36-5438-4F8A-BB13-073645DAA1C4", "versionEndExcluding": "2.2.10", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\n\n" } ], "id": "CVE-2023-28158", "lastModified": "2024-11-21T07:54:30.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 3.7, "source": "security@apache.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-29T13:15:08.313", "references": [ { "source": "security@apache.org", "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@apache.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:25
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2-m1 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 | |
apache | archiva | 1.3.2 | |
apache | archiva | 1.3.3 | |
apache | archiva | 1.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2-m1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF0EA32-14C3-4BB9-9779-E2089FAA2867", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "19E4F29D-795C-4CE2-85CA-3322B1598F9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3nd e comandos en sitios cruzados (XSS) en Apache Archiva v1.0 a v1.2.2 y v1.3.x antes de v1.3.5, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-1077", "lastModified": "2024-11-21T01:25:28.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-02T20:55:02.310", "references": [ { "source": "secalert@redhat.com", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8267" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48011" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }