Source: apache-jena X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerabilities were published for apache-jena. Unfortunately the Apache security process is quite poor and limited information gets made available, so it might be needed to reach out to upstream to get more detailed information. CVE-2021-33192[0]: | A vulnerability in the HTML pages of Apache Jena Fuseki allows an | attacker to execute arbitrary javascript on certain page views. This | issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 | (inclusive). https://lists.apache.org/thread/sq6q94q0prqwr9vdm2wptglcq1kv98k8 CVE-2021-39239[1]: | A vulnerability in XML processing in Apache Jena, in versions up to | 4.1.0, may allow an attacker to execute XML External Entities (XXE), | including exposing the contents of local files to a remote server. https://lists.apache.org/thread/qpbfrdty7jt3yfm39hx4p9dp151sd6gm CVE-2022-28890[2]: | A vulnerability in the RDF/XML parser of Apache Jena allows an | attacker to cause an external DTD to be retrieved. This issue affects | Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and | 4.3.x do not allow external entities. https://www.openwall.com/lists/oss-security/2022/05/04/1 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-33192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33192 [1] https://security-tracker.debian.org/tracker/CVE-2021-39239 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39239 [2] https://security-tracker.debian.org/tracker/CVE-2022-28890 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28890 Please adjust the affected versions in the BTS as needed.