Lucene search

K
githubGitHub Advisory DatabaseGHSA-XGH5-GWQ5-RPX8
HistoryApr 25, 2023 - 9:30 a.m.

Arbitrary javascript injection in Apache Jena

2023-04-2509:30:29
CWE-917
GitHub Advisory Database
github.com
7
arbitrary javascript injection
remote code execution
sparql query

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

55.7%

There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.

Affected configurations

Vulners
Node
org.apache.jena\Matchjena
CPENameOperatorVersion
org.apache.jena:jenalt4.8.0

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

55.7%