|
Message-ID: <01e07723-a942-3faf-824a-17585ab7a6d1@apache.org> Date: Mon, 24 Apr 2023 19:03:51 +0000 From: Andy Seaborne <andy@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-22665: Apache Jena: Exposure of arbitrary execution in script engine expressions. Severity: important Description: There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query. Credit: L3yx of Syclover Security Team (reporter) References: https://jena.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-22665
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.