CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user. | 6.5 |
Medium |
||
If anonymous read enabled, it's possible to read the database file directly without logging in. | 7.5 |
High |
||
Users with write permissions to a repository can delete arbitrary directories. | 4.3 |
Medium |
||
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8 | 6.5 |
Medium |
||
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects. | 5.3 |
Medium |
||
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | 6.5 |
Medium |
||
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised. | 6.5 |
Medium |