Apache Software Foundation Syncope 2.1.3

CPE Details

Apache Software Foundation Syncope 2.1.3
2.1.3
2019-06-14
12h27 +00:00
2019-06-14
12h27 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:apache:syncope:2.1.3:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

syncope

Version

2.1.3

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-38503 2024-07-22 09h46 +00:00 When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits. The same vulnerability was found in the Syncope Enduser, when editing “Personal Information” or “User Requests”. Users are recommended to upgrade to version 3.0.8, which fixes this issue.
5.4
Moyen
CVE-2020-11977 2020-09-15 17h02 +00:00 In Apache Syncope 2.1.X releases prior to 2.1.7, when the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and code execution.
7.2
Haute
CVE-2020-1961 2020-05-04 10h28 +00:00 Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.
9.8
Critique
CVE-2019-17557 2020-05-04 10h27 +00:00 It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
5.4
Moyen
CVE-2020-1959 2020-05-04 10h25 +00:00 A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
9.8
Critique