First published: Tue Jul 11 2023(Updated: )
There is insufficient restrictions of called script functions in Apache Jena versions 4.8.0 and earlier. It allows a remote user to execute javascript via a SPARQL query. This issue affects Apache Jena: from 3.7.0 through 4.8.0.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Jena | >=3.7.0<=4.8.0 | |
maven/org.apache.jena:jena | >=3.7.0<4.9.0 | 4.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32200 is a vulnerability in Apache Jena that allows a remote user to execute JavaScript via a SPARQL query.
CVE-2023-32200 exposes the execution of script engine expressions, allowing remote JavaScript execution.
Apache Jena versions 3.7.0 through 4.8.0 are affected by CVE-2023-32200.
CVE-2023-32200 has a severity score of 8.8, indicating a high severity.
To fix CVE-2023-32200, upgrade Apache Jena to version 4.9.0 or later.