First published: Mon Jul 22 2024(Updated: )
When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits. The same vulnerability was found in the Syncope Enduser, when editing "Personal Information" or "User Requests". Users are recommended to upgrade to version 3.0.8, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.syncope.client.idrepo:syncope-client-idrepo-console | >=2.1.0<3.0.8 | 3.0.8 |
maven/org.apache.syncope.client.idrepo:syncope-client-idrepo-common-ui | >=2.1.0<3.0.8 | 3.0.8 |
Apache Syncope | >=2.1.0<=2.1.14 | |
Apache Syncope | >=3.0.0<3.0.8 | |
>=2.1.0<=2.1.14 | ||
>=3.0.0<3.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38503 is classified as a potential security exploit due to the ability to inject HTML tags into text fields.
To fix CVE-2024-38503, update your Apache Syncope application to version 3.0.8 or later.
CVE-2024-38503 affects Apache Syncope versions from 2.1.0 to 3.0.8.
CVE-2024-38503 affects the Syncope Console and Syncope Enduser components.
Yes, the HTML tag injection from CVE-2024-38503 could potentially lead to data breaches if exploited.