Vulnerabilites related to apache - archiva
CVE-2010-4408 (GCVE-0-2010-4408)
Vulnerability from cvelistv5
Published
2010-12-06 20:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator\u0027s password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator\u0027s password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2@mail.gmail.com%3E" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4408", "datePublished": "2010-12-06T20:00:00", "dateReserved": "2010-12-06T00:00:00", "dateUpdated": "2024-08-07T03:43:14.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0533 (GCVE-0-2011-0533)
Vulnerability from cvelistv5
Published
2011-02-17 17:00
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "70925", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70925" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "name": "46311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46311" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43261" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "1025065", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025065" }, { "name": "20110216 [SECURITY] CVE-2011-0533: Apache Archiva cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12581", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "name": "8091", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8091" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "name": "ADV-2011-0426", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "name": "43334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43334" }, { "name": "continuum-unspec-xss(65343)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "name": "20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20110211 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "70925", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70925" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "name": "46311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46311" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43261" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "1025065", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025065" }, { "name": "20110216 [SECURITY] CVE-2011-0533: Apache Archiva cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12581", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "name": "8091", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8091" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "name": "ADV-2011-0426", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "name": "43334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43334" }, { "name": "continuum-unspec-xss(65343)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "name": "20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20110211 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0533", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "70925", "refsource": "OSVDB", "url": "http://osvdb.org/70925" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "name": "46311", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46311" }, { "name": "43261", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43261" }, { "name": "http://jira.codehaus.org/browse/CONTINUUM-2604", "refsource": "CONFIRM", "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360@apache.org%3E" }, { "name": "ADV-2011-0373", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "1025065", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025065" }, { "name": "20110216 [SECURITY] CVE-2011-0533: Apache Archiva cross-site scripting vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12581", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "name": "8091", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8091" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "name": "ADV-2011-0426", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "name": "43334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43334" }, { "name": "continuum-unspec-xss(65343)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "name": "20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "name": "http://continuum.apache.org/security.html", "refsource": "CONFIRM", "url": "http://continuum.apache.org/security.html" }, { "name": "20110211 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2011/Feb/236" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0533", "datePublished": "2011-02-17T17:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1026 (GCVE-0-2011-1026)
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8266", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8266" }, { "name": "20110527 [SECURITY] CVE-2011-1026: Apache Archiva Multiple CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-csrf(67671)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "name": "48015", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48015" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20110531 [CVE-2011-1026] Apache Archiva Multiple CSRF vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "8266", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8266" }, { "name": "20110527 [SECURITY] CVE-2011-1026: Apache Archiva Multiple CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-csrf(67671)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "name": "48015", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48015" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20110531 [CVE-2011-1026] Apache Archiva Multiple CSRF vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8266", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8266" }, { "name": "20110527 [SECURITY] CVE-2011-1026: Apache Archiva Multiple CSRF vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "name": "44693", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-csrf(67671)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "name": "48015", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48015" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "20110531 [CVE-2011-1026] Apache Archiva Multiple CSRF vulnerabilities", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "name": "http://archiva.apache.org/docs/1.3.5/release-notes.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1026", "datePublished": "2011-06-02T20:00:00", "dateReserved": "2011-02-14T00:00:00", "dateUpdated": "2024-08-06T22:14:27.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5005 (GCVE-0-2016-5005)
Vulnerability from cvelistv5
Published
2016-07-28 16:00
Modified
2024-08-06 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:46:40.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160711 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036475" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "name": "91707", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91707" }, { "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T17:06:05", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20160711 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036475" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "name": "91707", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91707" }, { "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160711 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "name": "1036475", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036475" }, { "name": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "name": "91707", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91707" }, { "name": "20160712 [RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5005", "datePublished": "2016-07-28T16:00:00", "dateReserved": "2016-05-24T00:00:00", "dateUpdated": "2024-08-06T00:46:40.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29405 (GCVE-0-2022-29405)
Vulnerability from cvelistv5
Published
2022-05-25 07:15
Modified
2024-08-03 06:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Apache Archiva Arbitrary user password reset vulnerability
Summary
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: 2.2 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:55.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.2.7", "status": "affected", "version": "2.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8" } ], "problemTypes": [ { "descriptions": [ { "description": "Apache Archiva Arbitrary user password reset vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-25T07:15:11", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Archiva Arbitrary user password reset vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-29405", "STATE": "PUBLIC", "TITLE": "Apache Archiva Arbitrary user password reset vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "2.2", "version_value": "2.2.7" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ {} ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Apache Archiva Arbitrary user password reset vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://archiva.apache.org/docs/2.2.8/release-notes.html", "refsource": "MISC", "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-29405", "datePublished": "2022-05-25T07:15:11", "dateReserved": "2022-04-18T00:00:00", "dateUpdated": "2024-08-03T06:17:55.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-28158 (GCVE-0-2023-28158)
Vulnerability from cvelistv5
Published
2023-03-29 12:21
Modified
2025-02-13 16:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Privilege escalation via stored XSS using the file upload service to upload malicious content.
The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: 2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:30:24.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T15:12:27.939865Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:12:35.785Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "2.2.10", "status": "affected", "version": "2.0", "versionType": "maven" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "sandr0 (sandr0.xyz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-18T02:06:24.671Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" }, { "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Archiva privilege escalation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-28158", "datePublished": "2023-03-29T12:21:46.932Z", "dateReserved": "2023-03-13T02:37:38.879Z", "dateUpdated": "2025-02-13T16:45:40.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2187 (GCVE-0-2013-2187)
Vulnerability from cvelistv5
Published
2014-04-22 14:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "66991", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20140419 [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "name": "1030130", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030130" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "66991", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "20140419 [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "name": "1030130", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030130" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "66991", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66991" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "20140419 [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "name": "1030130", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030130" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2187", "datePublished": "2014-04-22T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0214 (GCVE-0-2019-0214)
Vulnerability from cvelistv5
Published
2019-04-30 21:48
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary write/delete of files on the archiva server
Summary
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache | Apache Archiva |
Version: All versions prior to version 2.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "name": "20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108124" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache", "versions": [ { "status": "affected", "version": "All versions prior to version 2.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary write/delete of files on the archiva server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-02T16:06:04", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "name": "20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108124" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0214", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "All versions prior to version 2.2.4" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary write/delete of files on the archiva server" } ] } ] }, "references": { "reference_data": [ { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E" }, { "name": "20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "name": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "name": "http://archiva.apache.org/security.html#CVE-2019-0214", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E" }, { "name": "108124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108124" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0214: Apache Archiva arbitrary file write and delete on the server", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0214", "datePublished": "2019-04-30T21:48:54", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:14.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4469 (GCVE-0-2016-4469)
Vulnerability from cvelistv5
Published
2016-07-28 16:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036475" }, { "name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "name": "91703", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91703" }, { "name": "40109", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40109/" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T17:06:05", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "name": "1036475", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036475" }, { "name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "name": "91703", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91703" }, { "name": "40109", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40109/" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "name": "20160712 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "name": "1036475", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036475" }, { "name": "20160711 [RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "name": "91703", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91703" }, { "name": "40109", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40109/" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4469", "datePublished": "2016-07-28T16:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:25.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-40308 (GCVE-0-2022-40308)
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2025-04-30 16:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary file read vulnerability
Summary
If anonymous read enabled, it's possible to read the database file directly without logging in.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: Apache Archiva < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" }, { "name": "[oss-security] 20221115 CVE-2022-40308: Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-40308", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T16:02:48.785683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-30T16:03:13.651Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.2.8", "status": "affected", "version": "Apache Archiva", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to L3yx of Syclover Security Team" } ], "descriptions": [ { "lang": "en", "value": "If anonymous read enabled, it\u0027s possible to read the database file directly without logging in." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary file read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" }, { "name": "[oss-security] 20221115 CVE-2022-40308: Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-40308", "datePublished": "2022-11-15T00:00:00.000Z", "dateReserved": "2022-09-09T00:00:00.000Z", "dateUpdated": "2025-04-30T16:03:13.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0213 (GCVE-0-2019-0213)
Vulnerability from cvelistv5
Published
2019-04-30 21:35
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Stored XSS
Summary
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache | Apache Archiva |
Version: All versions prior to version 2.2.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108123" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache", "versions": [ { "status": "affected", "version": "All versions prior to version 2.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised." } ], "problemTypes": [ { "descriptions": [ { "description": "Stored XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-06T19:58:29", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "name": "108123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108123" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "All versions prior to version 2.2.4" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stored XSS" } ] } ] }, "references": { "reference_data": [ { "name": "20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "name": "[maven-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-users] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "name": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "name": "http://archiva.apache.org/security.html#CVE-2019-0213", "refsource": "MISC", "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "name": "[archiva-issues] 20190501 [jira] [Created] (MRM-1987) Port security fixes for 2.2.4 to 3.0.0", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E" }, { "name": "108123", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108123" }, { "name": "[announce] 20190430 [SECURITY] CVE-2019-0213: Apache Archiva Stored XSS", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0213", "datePublished": "2019-04-30T21:35:47", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:14.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1077 (GCVE-0-2011-1077)
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110527 [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-xss(67672)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "name": "20110531 [CVE-2011-1077] Apache Archiva Multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "8267", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8267" }, { "name": "48011", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48011" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20110527 [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "name": "44693", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-xss(67672)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "name": "20110531 [CVE-2011-1077] Apache Archiva Multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "8267", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8267" }, { "name": "48011", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48011" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1077", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110527 [SECURITY] CVE-2011-1077: Apache Archiva Multiple XSS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "name": "44693", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44693" }, { "name": "archiva-multiple-xss(67672)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "name": "20110531 [CVE-2011-1077] Apache Archiva Multiple XSS vulnerabilities", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "8267", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8267" }, { "name": "48011", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48011" }, { "name": "http://archiva.apache.org/docs/1.3.5/release-notes.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1077", "datePublished": "2011-06-02T20:00:00", "dateReserved": "2011-02-24T00:00:00", "dateUpdated": "2024-08-06T22:14:27.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-5657 (GCVE-0-2017-5657)
Vulnerability from cvelistv5
Published
2017-05-22 18:00
Modified
2024-08-05 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Apache Archiva CSRF vulnerabilities for various REST endpoints
Summary
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: 1.x Version: 2.0.0, 2.0.1 Version: 2.1.0, 2.1.1 Version: 2.2.0, 2.2.1, 2.2.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.x" }, { "status": "affected", "version": "2.0.0, 2.0.1" }, { "status": "affected", "version": "2.1.0, 2.1.1" }, { "status": "affected", "version": "2.2.0, 2.2.1, 2.2.2" } ] } ], "datePublic": "2017-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." } ], "problemTypes": [ { "descriptions": [ { "description": "Apache Archiva CSRF vulnerabilities for various REST endpoints", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-16T17:06:06", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5657", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "1.x" }, { "version_value": "2.0.0, 2.0.1" }, { "version_value": "2.1.0, 2.1.1" }, { "version_value": "2.2.0, 2.2.1, 2.2.2" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Apache Archiva CSRF vulnerabilities for various REST endpoints" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html#CVE-2017-5657", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-5657", "datePublished": "2017-05-22T18:00:00", "dateReserved": "2017-01-29T00:00:00", "dateUpdated": "2024-08-05T15:11:48.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-40309 (GCVE-0-2022-40309)
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2025-04-30 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary directory deletion
Summary
Users with write permissions to a repository can delete arbitrary directories.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" }, { "name": "[oss-security] 20221115 CVE-2022-40309: Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-40309", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T16:02:01.273540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-30T16:02:30.071Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.2.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to L3yx of Syclover Security Team" } ], "descriptions": [ { "lang": "en", "value": "Users with write permissions to a repository can delete arbitrary directories." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary directory deletion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" }, { "name": "[oss-security] 20221115 CVE-2022-40309: Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-40309", "datePublished": "2022-11-15T00:00:00.000Z", "dateReserved": "2022-09-09T00:00:00.000Z", "dateUpdated": "2025-04-30T16:02:30.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2251 (GCVE-0-2013-2251)
Vulnerability from cvelistv5
Published
2013-07-18 01:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "apache-archiva-ognl-command-exec(90392)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "name": "20131013 Apache Software Foundation A Subsite Remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "98445", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/98445" }, { "name": "1032916", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032916" }, { "name": "61189", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61189" }, { "name": "1029184", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029184" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2013-2251", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:24:31.949070Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2251" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:54.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-25T00:00:00+00:00", "value": "CVE-2013-2251 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-16T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:06:20.000Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "apache-archiva-ognl-command-exec(90392)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "name": "20131013 Apache Software Foundation A Subsite Remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "98445", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/98445" }, { "name": "1032916", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032916" }, { "name": "61189", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61189" }, { "name": "1029184", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029184" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2251", "datePublished": "2013-07-18T01:00:00.000Z", "dateReserved": "2013-02-19T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:54.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27140 (GCVE-0-2024-27140)
Vulnerability from cvelistv5
Published
2024-03-01 15:40
Modified
2025-02-13 17:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
** UNSUPPORTED WHEN ASSIGNED **
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Archiva.
This issue affects Apache Archiva: from 2.0.0.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: 2.0.0 ≤ * |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/2" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-05T20:53:57.523304Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:06:42.184Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "sandr0 / Sandro Bauer (sandr0.xyz)" }, { "lang": "en", "type": "finder", "value": "BTullis / Ben Tullis (wikimedia.org)" }, { "lang": "en", "type": "finder", "value": "sbassett / Scott Bassett (wikimedia.org)" }, { "lang": "en", "type": "finder", "value": "L0ne1y" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e** UNSUPPORTED WHEN ASSIGNED **\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in Apache Archiva.\u003c/div\u003e\u003cp\u003eThis issue affects Apache Archiva: from 2.0.0.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "** UNSUPPORTED WHEN ASSIGNED **\n\nImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in Apache Archiva.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T18:11:11.011Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy" }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/01/2" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "Apache Archiva: reflected XSS", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-27140", "datePublished": "2024-03-01T15:40:08.456Z", "dateReserved": "2024-02-20T15:56:43.961Z", "dateUpdated": "2025-02-13T17:41:19.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27139 (GCVE-0-2024-27139)
Vulnerability from cvelistv5
Published
2024-03-01 15:40
Modified
2025-04-16 20:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
** UNSUPPORTED WHEN ASSIGNED **
Incorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.
This issue affects Apache Archiva: from 2.0.0.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: 2.0.0 ≤ * |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:apache_software_foundation:apache_archiva:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "apache_archiva", "vendor": "apache_software_foundation", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27139", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T15:21:13.533716Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T20:47:27.623Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "1uHrm of cyberkl" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "** UNSUPPORTED WHEN ASSIGNED **\u003cbr\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eIncorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.\u003cbr\u003e\u003c/div\u003e\u003cp\u003eThis issue affects Apache Archiva: from 2.0.0.\u003c/p\u003e\u003cp\u003eAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\u003cbr\u003e\u003c/p\u003e" } ], "value": "** UNSUPPORTED WHEN ASSIGNED **\n\nIncorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T18:06:37.285Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8" }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/01/3" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "Apache Archiva: incorrect authentication potentially leading to account takeover", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-27139", "datePublished": "2024-03-01T15:40:49.893Z", "dateReserved": "2024-02-20T15:54:30.546Z", "dateUpdated": "2025-04-16T20:47:27.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27138 (GCVE-0-2024-27138)
Vulnerability from cvelistv5
Published
2024-03-01 15:41
Modified
2025-02-13 17:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.
Apache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Archiva |
Version: 2.0.0 ≤ * |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/4" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "archiva", "vendor": "apache", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27138", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T20:35:32.425736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-21T20:39:03.401Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Archiva", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Florian Hauser, @frycos" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\u003cbr\u003e\u003c/div\u003e\u003cp\u003e\u003c/p\u003e\u003cdiv\u003eNOTE: This vulnerability only affects products that are no longer supported by the maintainer\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cbr\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\n\nApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer" } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T17:11:18.723Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2" }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/01/4" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "Apache Archiva: disabling user registration is not effective", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-27138", "datePublished": "2024-03-01T15:41:12.677Z", "dateReserved": "2024-02-20T15:31:32.266Z", "dateUpdated": "2025-02-13T17:41:18.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3449 (GCVE-0-2010-3449)
Vulnerability from cvelistv5
Published
2010-12-06 20:00
Modified
2024-08-07 03:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:11:44.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42376", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42376" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "name": "20110211 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "name": "45095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43261" }, { "name": "20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "name": "69520", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/69520" }, { "name": "ADV-2010-3098", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "1025066", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025066" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "42376", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42376" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "name": "20110211 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "name": "45095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "name": "43261", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43261" }, { "name": "20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "ADV-2011-0373", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "name": "69520", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/69520" }, { "name": "ADV-2010-3098", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://continuum.apache.org/security.html" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "1025066", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025066" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42376", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42376" }, { "name": "http://jira.codehaus.org/browse/MRM-1438", "refsource": "CONFIRM", "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "name": "20110211 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "name": "45095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45095" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "name": "43261", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43261" }, { "name": "20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "name": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "http://archiva.apache.org/security.html", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html" }, { "name": "ADV-2011-0373", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "name": "69520", "refsource": "OSVDB", "url": "http://www.osvdb.org/69520" }, { "name": "ADV-2010-3098", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "name": "[archiva-users] 20101129 Apache Archiva CSRF Vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2@mail.gmail.com%3E" }, { "name": "[continuum-users] 20110210 [SECURITY] CVE-2010-3449: Apache Continuum CSRF vulnerability", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695@apache.org%3E" }, { "name": "http://continuum.apache.org/security.html", "refsource": "CONFIRM", "url": "http://continuum.apache.org/security.html" }, { "name": "20101129 [CVE-2010-3449] Apache Archiva CSRF Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "name": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "name": "1025066", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025066" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3449", "datePublished": "2010-12-06T20:00:00", "dateReserved": "2010-09-17T00:00:00", "dateUpdated": "2024-08-07T03:11:44.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-9495 (GCVE-0-2020-9495)
Vulnerability from cvelistv5
Published
2020-06-19 18:59
Modified
2024-08-04 10:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache Archiva |
Version: Apache Archiva 2.2.4 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:34:38.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "name": "[maven-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-dev] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "name": "[archiva-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "name": "[announce] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Archiva", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache Archiva 2.2.4 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-20T01:06:11", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "name": "[maven-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-dev] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "name": "[archiva-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "name": "[announce] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2020-9495", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "Apache Archiva 2.2.4 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html#CVE-2020-9495", "refsource": "MISC", "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "name": "[maven-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3E" }, { "name": "[archiva-dev] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3E" }, { "name": "[archiva-users] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3E" }, { "name": "[oss-security] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "name": "[announce] 20200619 [SECURITY] CVE-2020-9495: Apache Archiva login service is vulnerable to LDAP injection", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2020-9495", "datePublished": "2020-06-19T18:59:20", "dateReserved": "2020-03-01T00:00:00", "dateUpdated": "2024-08-04T10:34:38.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-03-01 16:15
Modified
2025-05-28 19:55
Severity ?
Summary
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.
Apache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2024/03/01/4 | Mailing List | |
security@apache.org | https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/03/01/4 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2 | Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4639C4D-2057-48BA-A581-8539C5C87044", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "security@apache.org", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\n\nApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer" }, { "lang": "es", "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Archiva. Apache Archiva tiene una configuraci\u00f3n para deshabilitar el registro de usuarios; sin embargo, esta restricci\u00f3n se puede evitar. Como Apache Archiva ha sido retirado, no esperamos lanzar una versi\u00f3n de Apache Archiva que solucione este problema. Se recomienda considerar la posibilidad de migrar a una soluci\u00f3n diferente o aislar su instancia de usuarios que no sean de confianza. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante" } ], "id": "CVE-2024-27138", "lastModified": "2025-05-28T19:55:00.220", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-03-01T16:15:45.983", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/4" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security@apache.org", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-19 19:15
Modified
2024-11-21 05:40
Severity ?
Summary
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://archiva.apache.org/security.html#CVE-2020-9495 | Vendor Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2020/06/19/1 | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html#CVE-2020-9495 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2020/06/19/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8213C5F-5C63-46A4-BC2A-168E62C04E01", "versionEndExcluding": "2.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects." }, { "lang": "es", "value": "El servicio de inicio de sesi\u00f3n de Apache Archiva versiones anteriores a 2.2.5, es vulnerable a una inyecci\u00f3n de LDAP. Un atacante es capaz de recuperar datos de atributos de usuario desde el servidor LDAP conectado al proporcionar valores especiales al formulario de inicio de sesi\u00f3n. Con determinados caracteres es posible modificar el filtro LDAP usado para consultar a los usuarios de LDAP. Al medir el tiempo de respuesta para la petici\u00f3n de inicio de sesi\u00f3n, pueden ser recuperados datos de atributos arbitrarios desde los objetos de usuario de LDAP" } ], "id": "CVE-2020-9495", "lastModified": "2024-11-21T05:40:46.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-19T19:15:12.887", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2020-9495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3E" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-15 13:15
Modified
2025-04-30 16:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
If anonymous read enabled, it's possible to read the database file directly without logging in.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2022/11/15/2 | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/15/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc | Issue Tracking, Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "76551255-460B-4761-99E7-CFC2BD3DF2BE", "versionEndExcluding": "2.2.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If anonymous read enabled, it\u0027s possible to read the database file directly without logging in." }, { "lang": "es", "value": "Si la lectura an\u00f3nima est\u00e1 habilitada, es posible leer el archivo de la base de datos directamente sin iniciar sesi\u00f3n." } ], "id": "CVE-2022-40308", "lastModified": "2025-04-30T16:15:26.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-11-15T13:15:10.413", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archiva.apache.org/docs/1.3.5/release-notes.html | ||
secalert@redhat.com | http://archiva.apache.org/security.html | Vendor Advisory | |
secalert@redhat.com | http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html | Exploit | |
secalert@redhat.com | http://secunia.com/advisories/44693 | Vendor Advisory | |
secalert@redhat.com | http://securityreason.com/securityalert/8267 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/518167/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/48011 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/67672 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/docs/1.3.5/release-notes.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44693 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/8267 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/518167/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48011 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67672 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2-m1 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 | |
apache | archiva | 1.3.2 | |
apache | archiva | 1.3.3 | |
apache | archiva | 1.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2-m1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF0EA32-14C3-4BB9-9779-E2089FAA2867", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "19E4F29D-795C-4CE2-85CA-3322B1598F9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3nd e comandos en sitios cruzados (XSS) en Apache Archiva v1.0 a v1.2.2 y v1.3.x antes de v1.3.5, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-1077", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-02T20:55:02.310", "references": [ { "source": "secalert@redhat.com", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8267" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48011" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0531.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518167/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67672" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-30 22:29
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://archiva.apache.org/security.html#CVE-2019-0214 | Vendor Advisory | |
security@apache.org | http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html | Mitigation, Third Party Advisory, VDB Entry | |
security@apache.org | http://www.openwall.com/lists/oss-security/2019/04/30/8 | Mailing List, Third Party Advisory | |
security@apache.org | http://www.securityfocus.com/bid/108124 | Third Party Advisory, VDB Entry | |
security@apache.org | https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E | ||
security@apache.org | https://seclists.org/bugtraq/2019/Apr/48 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html#CVE-2019-0214 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html | Mitigation, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/04/30/8 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108124 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Apr/48 | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED5631C-7537-41E4-A174-0DE0259B2BFB", "versionEndIncluding": "1.3.9", "versionStartIncluding": "1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEC9D225-6ABA-49E5-A3DE-419032D259AF", "versionEndIncluding": "2.2.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file." }, { "lang": "es", "value": "En Apache Archiva versiones desde la 2.0.0 hasta la 2.2.3, es posible escribir archivos en archiva server, en ubicaciones arbitrarias utilizando el mecanismo artifact upload. Los archivos existentes pueden sobrescribirse, si el usuario de la ejecuci\u00f3n de archiva tiene el permiso apropiado en el sistema de archivos para el archivo de destino." } ], "id": "CVE-2019-0214", "lastModified": "2024-11-21T04:16:30.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-30T22:29:01.027", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108124" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e%40%3Cusers.maven.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda%40%3Cusers.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/48" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-30 22:29
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://archiva.apache.org/security.html#CVE-2019-0213 | Vendor Advisory | |
security@apache.org | http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.openwall.com/lists/oss-security/2019/04/30/7 | Mailing List, Third Party Advisory | |
security@apache.org | http://www.securityfocus.com/bid/108123 | Third Party Advisory, VDB Entry | |
security@apache.org | https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E | ||
security@apache.org | https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E | ||
security@apache.org | https://seclists.org/bugtraq/2019/Apr/47 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html#CVE-2019-0213 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/04/30/7 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108123 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Apr/47 | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AB5FF1B-F9F2-458C-BFE7-BA144AE1CAF2", "versionEndExcluding": "2.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised." }, { "lang": "es", "value": "En Apache Archiva anterior a versi\u00f3n 2.2.4, puede ser posible almacenar c\u00f3digo XSS malicioso en entradas de configuraci\u00f3n central, es decir, la URL logo. La vulnerabilidad es considerada un riesgo menor, ya que solo los usuarios con rol de administrador pueden cambiar la configuraci\u00f3n, o la comunicaci\u00f3n entre el navegador y el servidor Archiva debe verse comprometida." } ], "id": "CVE-2019-0213", "lastModified": "2024-11-21T04:16:30.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-30T22:29:00.793", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108123" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2019-0213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Apr/47" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archiva.apache.org/docs/1.3.5/release-notes.html | ||
secalert@redhat.com | http://archiva.apache.org/security.html | Vendor Advisory | |
secalert@redhat.com | http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html | Exploit | |
secalert@redhat.com | http://secunia.com/advisories/44693 | Vendor Advisory | |
secalert@redhat.com | http://securityreason.com/securityalert/8266 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/518168/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/48015 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/67671 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/docs/1.3.5/release-notes.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44693 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/8266 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/518168/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48015 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67671 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2-m1 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 | |
apache | archiva | 1.3.2 | |
apache | archiva | 1.3.3 | |
apache | archiva | 1.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2-m1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF0EA32-14C3-4BB9-9779-E2089FAA2867", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "19E4F29D-795C-4CE2-85CA-3322B1598F9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados(CSRF) en Apache Archiva v1.0 a v1.2.2 y v1.3.x antes de v1.3.5, permiten a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores.\r\n" } ], "id": "CVE-2011-1026", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-02T20:55:02.263", "references": [ { "source": "secalert@redhat.com", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8266" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48015" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/docs/1.3.5/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0532.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518168/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67671" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 20:13
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archiva.apache.org/security.html | ||
secalert@redhat.com | http://continuum.apache.org/security.html | ||
secalert@redhat.com | http://jira.codehaus.org/browse/MRM-1438 | ||
secalert@redhat.com | http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E | ||
secalert@redhat.com | http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2011/Feb/238 | ||
secalert@redhat.com | http://secunia.com/advisories/42376 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43261 | ||
secalert@redhat.com | http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518&r2=1038517&pathrev=1038518 | Patch | |
secalert@redhat.com | http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518&r2=1038517&pathrev=1038518 | Patch | |
secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1038518 | ||
secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1066010 | ||
secalert@redhat.com | http://www.osvdb.org/69520 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/514937/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/516341/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/45095 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1025066 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/3098 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0373 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://continuum.apache.org/security.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://jira.codehaus.org/browse/MRM-1438 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2011/Feb/238 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42376 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43261 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518&r2=1038517&pathrev=1038518 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518&r2=1038517&pathrev=1038518 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1038518 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1066010 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/69520 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514937/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516341/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45095 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025066 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3098 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0373 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jesse_mcconnell | redback | * | |
jesse_mcconnell | redback | 1.0 | |
jesse_mcconnell | redback | 1.0 | |
jesse_mcconnell | redback | 1.0.1 | |
jesse_mcconnell | redback | 1.0.2 | |
jesse_mcconnell | redback | 1.0.3 | |
jesse_mcconnell | redback | 1.1 | |
jesse_mcconnell | redback | 1.1.1 | |
jesse_mcconnell | redback | 1.1.2 | |
jesse_mcconnell | redback | 1.2 | |
jesse_mcconnell | redback | 1.2 | |
jesse_mcconnell | redback | 1.2 | |
jesse_mcconnell | redback | 1.2.1 | |
jesse_mcconnell | redback | 1.2.2 | |
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:*:*:*:*:*:*:*:*", "matchCriteriaId": "39FE6A7B-7617-4482-B4B7-4069211BA2AA", "versionEndIncluding": "1.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1559A056-EBEA-44CE-BCE2-CC12EC5C0BF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "BD05018C-8159-4A78-AC7A-632B79E12E3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "42B97EE6-941F-477B-85CB-2DF3157E0748", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD23AC38-1D44-41E7-BFB0-E3F1629DC137", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0A19DB66-6636-460D-A081-F8CAB2882BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF7A373-CF78-438C-A7DC-3C363AD18A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "35C190A2-A099-44E1-85B7-E7BA47B29890", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "23C7C861-1CCF-49C1-B1B5-5B9058C3EE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4AE301F-877B-41DE-AFC7-ED649340AE4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "3E177652-1316-4F37-837D-912B4C43108F", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "6B8612CC-1978-4D42-9995-47A96BDEB502", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A949E134-1A33-4293-AB3E-1917CC9BCDCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:jesse_mcconnell:redback:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9223BE71-E90C-4561-BEFC-81C37624FC13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Redback anterior a versi\u00f3n 1.2.4, tal y como es usado en Apache Archiva versiones 1.0 hasta 1.0.3, versiones 1.1 hasta 1.1.4, versiones 1.2 hasta 1.2.2, y versiones 1.3 hasta 1.3.1; y Apache Continuum versiones 1.3.6, 1.4.0 y versiones 1.1 hasta 1.2.3.1; permite a los atacantes remotos secuestrar la autenticaci\u00f3n de administradores para peticiones que modifican las credenciales." } ], "id": "CVE-2010-3449", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-12-06T20:13:00.357", "references": [ { "source": "secalert@redhat.com", "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://continuum.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42376" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43261" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/69520" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45095" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025066" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://continuum.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jira.codehaus.org/browse/MRM-1438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C032C189E-D821-4833-A8F2-F72365147695%40apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2011/Feb/238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/archiva-modules/archiva-web/archiva-webapp/src/main/resources/struts.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/archiva/branches/archiva-1.3.x/pom.xml?r1=1038518\u0026r2=1038517\u0026pathrev=1038518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1038518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/69520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516341/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0373" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-15 13:15
Modified
2025-04-30 16:15
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Users with write permissions to a repository can delete arbitrary directories.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2022/11/15/3 | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27 | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/15/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27 | Issue Tracking, Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "76551255-460B-4761-99E7-CFC2BD3DF2BE", "versionEndExcluding": "2.2.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Users with write permissions to a repository can delete arbitrary directories." }, { "lang": "es", "value": "Los usuarios con permisos de escritura en un repositorio pueden eliminar directorios arbitrarios." } ], "id": "CVE-2022-40309", "lastModified": "2025-04-30T16:15:26.320", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-11-15T13:15:11.000", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-22 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://archiva.apache.org/security.html#CVE-2017-5657 | Patch, Vendor Advisory | |
security@apache.org | http://www.securityfocus.com/bid/98570 | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.securitytracker.com/id/1038528 | ||
security@apache.org | https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html#CVE-2017-5657 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98570 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038528 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EFE650A-FEA8-4182-AC36-C9EB41C39EC2", "versionEndIncluding": "2.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." }, { "lang": "es", "value": "Varios endpoints de servicio REST de Apache Archiva no est\u00e1n protegidos contra ataques de tipo Cross Site Request Forgery (CSRF). Un sitio malicioso abierto en el mismo navegador que el sitio archiva puede enviar una respuesta HTML que ejecuta acciones arbitrarias en los servicios de archiva, con los mismos derechos que la sesi\u00f3n de archiva activa (por ejemplo, derechos de administrador)." } ], "id": "CVE-2017-5657", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-22T18:29:00.177", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98570" }, { "source": "security@apache.org", "url": "http://www.securitytracker.com/id/1038528" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-28 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html | Exploit, Third Party Advisory | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2016/Jul/38 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/538878/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/91707 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1036475 | ||
secalert@redhat.com | https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Jul/38 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/538878/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91707 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036475 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88C4882-5FEB-4EAC-9489-103BBB266638", "versionEndIncluding": "1.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Apache Archiva 1.3.9 y versiones anteriores permite a administradores remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro connector.sourceRepoId para admin/addProxyConnector_commit.action." } ], "id": "CVE-2016-5005", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-28T16:59:01.380", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91707" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137870/Apache-Archiva-1.3.9-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Jul/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538878/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-17 18:00
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://continuum.apache.org/security.html | ||
secalert@redhat.com | http://jira.codehaus.org/browse/CONTINUUM-2604 | ||
secalert@redhat.com | http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E | ||
secalert@redhat.com | http://osvdb.org/70925 | ||
secalert@redhat.com | http://seclists.org/fulldisclosure/2011/Feb/236 | Patch | |
secalert@redhat.com | http://secunia.com/advisories/43261 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43334 | Vendor Advisory | |
secalert@redhat.com | http://securityreason.com/securityalert/8091 | ||
secalert@redhat.com | http://securitytracker.com/id?1025065 | ||
secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1066053 | Patch | |
secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1066056 | Patch | |
secalert@redhat.com | http://www.securityfocus.com/archive/1/516342/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/516474/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/46311 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0373 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0426 | Vendor Advisory | |
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65343 | ||
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://continuum.apache.org/security.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://jira.codehaus.org/browse/CONTINUUM-2604 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/70925 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2011/Feb/236 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43261 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43334 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/8091 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1025065 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1066053 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1066056 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516342/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516474/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46311 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0373 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0426 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65343 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | continuum | 1.1 | |
apache | continuum | 1.2 | |
apache | continuum | 1.2.2 | |
apache | continuum | 1.2.3 | |
apache | continuum | 1.2.3.1 | |
apache | continuum | 1.3.6 | |
apache | continuum | 1.4.0 | |
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 | |
apache | archiva | 1.3.2 | |
apache | archiva | 1.3.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:continuum:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "117CA011-B3D9-4A0B-B9D4-3CCADA18C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B9378F8-FEE0-4044-BFDD-609B9EF63FC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "29D35B80-7257-4F31-95CE-4A5D246BB949", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "93FC5BC1-4022-433C-80A8-369F9658BB76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0189E53C-113E-4A38-8CAC-C0D536797AF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "1BBBB14F-9048-4D92-B712-2DB48FB0F54B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:continuum:1.4.0:beta:*:*:*:*:*:*", "matchCriteriaId": "94C2C439-588B-457F-B66C-577FC5DBAB5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en Continuum versiones 1.1 hasta 1.2.3.1, versiones 1.3.6 y 1.4.0 Beta; y Archiva versiones 1.3.0 hasta 1.3.3 y versiones 1.0 hasta 1.22 de Apache, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de un par\u00e1metro especialmente dise\u00f1ado, relacionado con la configuraci\u00f3n autoIncludeParameters para la tabla extremecomponents." } ], "id": "CVE-2011-0533", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-17T18:00:03.760", "references": [ { "source": "secalert@redhat.com", "url": "http://continuum.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/70925" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43261" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43334" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8091" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025065" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46311" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://continuum.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jira.codehaus.org/browse/CONTINUUM-2604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516342/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516474/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-28 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html | Exploit, Third Party Advisory | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2016/Jul/37 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/538877/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/91703 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1036475 | ||
secalert@redhat.com | https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | ||
secalert@redhat.com | https://www.exploit-db.com/exploits/40109/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Jul/37 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/538877/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91703 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036475 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40109/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88C4882-5FEB-4EAC-9489-103BBB266638", "versionEndIncluding": "1.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de CSRF en Apache Archiva 1.3.9 y versiones anteriores permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que (1) a\u00f1aden nuevos conectores de proxy del repositorio a trav\u00e9s del par\u00e1metro token para admin/addProxyConnector_commit.action, (2) nuevos repositorios a trav\u00e9s del par\u00e1metro token para admin/addRepository_commit.action, (3) editan repositorios existentes a trav\u00e9s del par\u00e1metro token para admin/editRepository_commit.action, (4) a\u00f1aden rutas de artefactos de legado a trav\u00e9s del par\u00e1metro token para admin/addLegacyArtifactPath_commit.action, (5) cambian la apariencia organizacional a trav\u00e9s del par\u00e1metro token para admin/saveAppearance.action o (6) suben nuevos artefactos a trav\u00e9s del par\u00e1metro token para upload_submit.action." } ], "id": "CVE-2016-4469", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-28T16:59:00.130", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91703" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/40109/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/137869/Apache-Archiva-1.3.9-Cross-Site-Request-Forgery.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Jul/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538877/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/40109/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-01 16:15
Modified
2025-05-28 19:54
Severity ?
Summary
** UNSUPPORTED WHEN ASSIGNED **
Incorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.
This issue affects Apache Archiva: from 2.0.0.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2024/03/01/3 | Mailing List | |
security@apache.org | https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/03/01/3 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8 | Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4639C4D-2057-48BA-A581-8539C5C87044", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "security@apache.org", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED **\n\nIncorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." }, { "lang": "es", "value": "** NO COMPATIBLE CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Archiva: una vulnerabilidad en Apache Archiva permite que un atacante no autenticado modifique los datos de la cuenta, lo que podr\u00eda llevar a la apropiaci\u00f3n de la cuenta. Este problema afecta a Apache Archiva: desde 2.0.0. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "id": "CVE-2024-27139", "lastModified": "2025-05-28T19:54:51.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-03-01T16:15:46.067", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/3" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security@apache.org", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-01 16:15
Modified
2025-05-28 19:54
Severity ?
Summary
** UNSUPPORTED WHEN ASSIGNED **
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Archiva.
This issue affects Apache Archiva: from 2.0.0.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2024/03/01/2 | Mailing List | |
security@apache.org | https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/03/01/2 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy | Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4639C4D-2057-48BA-A581-8539C5C87044", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "security@apache.org", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED **\n\nImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in Apache Archiva.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." }, { "lang": "es", "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u0027cross-site Scripting\u0027) en Apache Archiva. Este problema afecta a Apache Archiva: desde 2.0.0. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. Alternativamente, puede configurar un proxy HTTP frente a su instancia de Archiva para reenviar solo solicitudes que no tengan caracteres maliciosos en la URL. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "id": "CVE-2024-27140", "lastModified": "2025-05-28T19:54:39.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-03-01T16:15:46.143", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@apache.org", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-29 13:15
Modified
2025-02-13 17:16
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Privilege escalation via stored XSS using the file upload service to upload malicious content.
The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2023/04/18/2 | ||
security@apache.org | https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2023/04/18/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt | Mailing List, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "95454E36-5438-4F8A-BB13-073645DAA1C4", "versionEndExcluding": "2.2.10", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user." } ], "id": "CVE-2023-28158", "lastModified": "2025-02-13T17:16:14.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 3.7, "source": "security@apache.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-29T13:15:08.313", "references": [ { "source": "security@apache.org", "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2023/04/18/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@apache.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-22 14:23
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archiva.apache.org/security.html | Patch, Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/archive/1/531884/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/66991 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1030130 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/531884/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/66991 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1030130 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEC394AE-2522-476B-82A9-5F7410B55398", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C14AFD31-A944-4422-A142-AE95AD8E1424", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "19E4F29D-795C-4CE2-85CA-3322B1598F9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4803C6A2-1B9C-48E5-9495-15EA25176396", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "59818802-9A36-421C-B2C6-0AD8906A5BF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Apache Archiva 1.2 hasta 1.2.2 y 1.3 anterior a 1.3.8 permite a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s de par\u00e1metros no especificados, relacionado con la p\u00e1gina de inicio." } ], "id": "CVE-2013-2187", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-04-22T14:23:34.017", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/66991" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1030130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531884/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030130" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-20 03:37
Modified
2025-04-11 00:51
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archiva.apache.org/security.html | Product | |
secalert@redhat.com | http://cxsecurity.com/issue/WLB-2014010087 | Exploit, Third Party Advisory | |
secalert@redhat.com | http://osvdb.org/98445 | Broken Link | |
secalert@redhat.com | http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2013/Oct/96 | Exploit, Mailing List, Third Party Advisory | |
secalert@redhat.com | http://seclists.org/oss-sec/2014/q1/89 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://struts.apache.org/release/2.3.x/docs/s2-016.html | Patch | |
secalert@redhat.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 | Third Party Advisory | |
secalert@redhat.com | http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Patch, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/61189 | Broken Link, Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securityfocus.com/bid/64758 | Broken Link, Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1029184 | Broken Link, Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1032916 | Broken Link, Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/90392 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html | Product | |
af854a3a-2127-422b-91ae-364da2661108 | http://cxsecurity.com/issue/WLB-2014010087 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/98445 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2013/Oct/96 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2014/q1/89 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/release/2.3.x/docs/s2-016.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/61189 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/64758 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029184 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032916 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/90392 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | * | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.2 | |
apache | struts | * | |
fujitsu | interstage_business_process_manager_analytics | 12.0 | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
redhat | enterprise_linux | * | |
fujitsu | interstage_business_process_manager_analytics | 12.1 | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_server_2012 | - | |
oracle | solaris | 11 | |
redhat | enterprise_linux | * | |
fujitsu | gp7000f_firmware | - | |
fujitsu | gp7000f | - | |
fujitsu | primepower_firmware | - | |
fujitsu | primepower | - | |
fujitsu | gp-s_firmware | - | |
fujitsu | gp-s | - | |
fujitsu | primergy_firmware | - | |
fujitsu | primergy | - | |
fujitsu | gp5000_firmware | - | |
fujitsu | gp5000 | - | |
fujitsu | sparc_firmware | - | |
fujitsu | sparc | - | |
oracle | siebel_apps_-_e-billing | 6.1 | |
oracle | siebel_apps_-_e-billing | 6.1.1 | |
oracle | siebel_apps_-_e-billing | 6.2 |
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Improper Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A10FB76-761D-4411-B6A8-B1AD5C133071", "versionEndExcluding": "1.3.8", "versionStartIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:-:*:*:*:*:*:*", "matchCriteriaId": "F0E0751C-E0BD-4C33-A541-C6FC67CE6663", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C63F76-5AFE-4D2F-B81C-D3476C165227", "versionEndIncluding": "2.3.15", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D24308C-EEFB-477D-A88C-95E76CAC8AD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D0C7AB6-1B62-49E3-99F8-53DD9329264E", "versionEndIncluding": "6.10", "versionStartIncluding": "5.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2825C5B3-6495-43FE-9D87-750C8B9B25EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": false }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D0C7AB6-1B62-49E3-99F8-53DD9329264E", "versionEndIncluding": "6.10", "versionStartIncluding": "5.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp7000f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "577FACF4-0FB9-461A-877C-32DA8DBBF2B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp7000f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D55A60A2-B9F8-49CF-AD55-033942363704", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:primepower_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5392609-A095-40AA-8190-783B8CCFDB18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:primepower:-:*:*:*:*:*:*:*", "matchCriteriaId": "77300584-CABF-4332-8E1A-763048496818", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "931139C5-A9D3-4D63-AF15-B0C5DD0578D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "855CDB9B-5476-4765-A8E3-69C7D42E1DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:primergy_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78239AD8-F1E1-49F2-A89F-F8488F21C014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:primergy:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9091D4-FC2B-43DE-A8C5-87922034536F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp5000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "262CD533-5171-4AB0-9537-65FC5FBA195E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3BE416-DA1B-4168-BE30-DFE3CD84E4E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3177688-5BBE-4C19-8A5C-FCF76AE2B227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E1A333-794C-44BE-9E2A-C6711169681E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "109A2A5D-D631-472F-AA80-2E1D707943F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51D5BAC9-E5B1-4A19-8B87-0CA2FA046D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F0DBE55-667B-45EF-8C3A-9C7AA33ADDE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix." }, { "lang": "es", "value": "Apache Struts v2.0.0 hasta v2.3.15 permite a atacantes remotos ejecutar expresiones OGNL arbitrarias mediante un par\u00e1metro con una (1)acci\u00f3n:, (2) redirect:, o (3) redirectAction:" } ], "id": "CVE-2013-2251", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2013-07-20T03:37:30.737", "references": [ { "source": "secalert@redhat.com", "tags": [ "Product" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://osvdb.org/98445" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/61189" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029184" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032916" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/98445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/61189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-25 08:15
Modified
2024-11-21 06:59
Severity ?
Summary
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://archiva.apache.org/docs/2.2.8/release-notes.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://archiva.apache.org/docs/2.2.8/release-notes.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1DAEB66-424F-4123-87DB-05EDA94632F2", "versionEndExcluding": "2.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8" }, { "lang": "es", "value": "En Apache Archiva, cualquier usuario registrado puede restablecer la contrase\u00f1a de cualquier usuario. Esto ha sido corregido en Archiva versi\u00f3n 2.2.8" } ], "id": "CVE-2022-29405", "lastModified": "2024-11-21T06:59:01.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-25T08:15:12.167", "references": [ { "source": "security@apache.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://archiva.apache.org/docs/2.2.8/release-notes.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 20:13
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archiva.apache.org/security.html | ||
cve@mitre.org | http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/514937/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archiva.apache.org/security.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514937/100/0/threaded |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | archiva | 1.0 | |
apache | archiva | 1.0.1 | |
apache | archiva | 1.0.2 | |
apache | archiva | 1.0.3 | |
apache | archiva | 1.1 | |
apache | archiva | 1.1.1 | |
apache | archiva | 1.1.2 | |
apache | archiva | 1.1.3 | |
apache | archiva | 1.1.4 | |
apache | archiva | 1.2 | |
apache | archiva | 1.2.1 | |
apache | archiva | 1.2.2 | |
apache | archiva | 1.3 | |
apache | archiva | 1.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFD6FB90-E505-48D6-B9D1-3E8DD3A47234", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "21DF9796-959A-4566-8AEF-16ABD8E36444", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08C7B72C-957A-44FA-BABA-03A7E4CEF36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5CFEDC8F-0FE0-4E69-8F6F-BD49AB46D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FF7D312-B1C1-400B-AF0C-7375B1B3F0E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31357E13-6571-4FE9-A5E0-2CACE0423C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED2E53F7-845B-4077-9AC9-EAAE60ADC75A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF420D40-A4BE-4B74-9457-01E1FFF9D9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1389E21-2451-45FF-97C3-87B58A496E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC7E1832-3889-477D-9DA4-869B6867EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F945FF3A-483C-4CD5-A413-0C354C15A99F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D1D107D-C022-43B4-BA64-0D39F31EE226", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F26131F0-693E-4245-9DC1-645B0EACD0D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator\u0027s password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449." }, { "lang": "es", "value": "Apache Archiva 1.0 hasta la versi\u00f3n 1.0.3, 1.1 hasta la 1.1.4, 1.2 hasta la 1.2.2, y 1.3 hasta la 1.3.1 no requiere la entrada de la contrase\u00f1a de administrador al modificar una cuenta de usuario, lo que facilita a atacantes dependientes del contexto escalar privilegios a trav\u00e9s de (1) equipos desatentidos o (2) una vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF). Un asunto relacionado con CVE-2010-3449." } ], "id": "CVE-2010-4408", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-12-06T20:13:00.560", "references": [ { "source": "cve@mitre.org", "url": "http://archiva.apache.org/security.html" }, { "source": "cve@mitre.org", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514937/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }