Apache

Syncope

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.66%
  • Veröffentlicht 24.10.2024 15:15:13
  • Zuletzt bearbeitet 29.09.2025 21:48:09

When editing objects in the Syncope Console, incomplete HTML tags could be used to bypass HTML sanitization. This made it possible to inject stored XSS payloads which would trigger for other users during ordinary usage of the application. XSS payload...

  • EPSS 1.15%
  • Veröffentlicht 22.07.2024 10:15:08
  • Zuletzt bearbeitet 06.12.2024 22:15:19

When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits. The same vulnerability was found in the Syncope Enduser, when editing “Personal Information” or “User Re...

  • EPSS 0.59%
  • Veröffentlicht 15.09.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 04:59:01

In Apache Syncope 2.1.X releases prior to 2.1.7, when the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and ...

  • EPSS 7.13%
  • Veröffentlicht 04.05.2020 13:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:44

Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was di...

  • EPSS 1.65%
  • Veröffentlicht 04.05.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:44

A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Valida...

  • EPSS 1.19%
  • Veröffentlicht 04.05.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:31

It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.

  • EPSS 0.62%
  • Veröffentlicht 06.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:02

An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.

  • EPSS 1%
  • Veröffentlicht 06.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:02

A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitl...

  • EPSS 4.81%
  • Veröffentlicht 20.03.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:37

An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11, 2.0.x before 2.0.8, and unsupported releases 1.0.x and 1.1.x which may be also affected, can use XSL Transformations (XSLT) to perform malicious operations,...

  • EPSS 6.73%
  • Veröffentlicht 20.03.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:37

An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11, 2.0.x before 2.0.8, and unsupported releases 1.0.x and 1.1.x which may be also affected, can recover sensitive security values using the fiql and orderby parameters...