First published: Tue Apr 25 2023(Updated: )
There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Jena | <4.8.0 | |
maven/org.apache.jena:jena | <4.8.0 | 4.8.0 |
Apache Jena | >=3.7.0<=4.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-22665.
The severity of CVE-2023-22665 is medium with a severity value of 5.4.
The affected software is Apache Jena versions 4.7.0 and earlier.
A remote user can exploit CVE-2023-22665 by executing arbitrary JavaScript via a SPARQL query.
You can fix CVE-2023-22665 by upgrading to Apache Jena version 4.8.0 or later.