Filtered by vendor Apache
Subscriptions
Filtered by product Archiva
Subscriptions
Total
17 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2013-2251 | 5 Apache, Fujitsu, Microsoft and 2 more | 21 Archiva, Struts, Gp-s and 18 more | 2024-11-27 | 9.8 Critical |
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix. | ||||
CVE-2023-28158 | 1 Apache | 1 Archiva | 2024-11-21 | 6.5 Medium |
Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user. | ||||
CVE-2022-40309 | 1 Apache | 1 Archiva | 2024-11-21 | 4.3 Medium |
Users with write permissions to a repository can delete arbitrary directories. | ||||
CVE-2022-40308 | 1 Apache | 1 Archiva | 2024-11-21 | 7.5 High |
If anonymous read enabled, it's possible to read the database file directly without logging in. | ||||
CVE-2022-29405 | 1 Apache | 1 Archiva | 2024-11-21 | 6.5 Medium |
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8 | ||||
CVE-2020-9495 | 1 Apache | 1 Archiva | 2024-11-21 | 5.3 Medium |
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects. | ||||
CVE-2019-0214 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | ||||
CVE-2019-0213 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised. | ||||
CVE-2017-5657 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights). | ||||
CVE-2016-5005 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action. | ||||
CVE-2016-4469 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action. | ||||
CVE-2013-2187 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page. | ||||
CVE-2011-1077 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2011-1026 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators. | ||||
CVE-2011-0533 | 1 Apache | 2 Archiva, Continuum | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table. | ||||
CVE-2010-4408 | 1 Apache | 1 Archiva | 2024-11-21 | N/A |
Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449. | ||||
CVE-2010-3449 | 2 Apache, Jesse Mcconnell | 2 Archiva, Redback | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1; and Apache Continuum 1.3.6, 1.4.0, and 1.1 through 1.2.3.1; allows remote attackers to hijack the authentication of administrators for requests that modify credentials. |
Page 1 of 1.