You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/site/xdoc/security.xml
+43Lines changed: 43 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,49 @@ under the License.
36
36
37
37
<p>If you want to report a vulnerability, please follow <ahref="https://www.apache.org/security/">the procedure</a>.</p>
38
38
39
+
<subsectionname="CVE-2025-57738: Apache Syncope: Remote Code Execution by delegated administrators">
40
+
<p>Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
41
+
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
42
+
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.</p>
43
+
44
+
<p>
45
+
<b>Severity</b>
46
+
</p>
47
+
<p>Moderate</p>
48
+
49
+
<p>
50
+
<b>Affects</b>
51
+
</p>
52
+
<p>
53
+
<ul>
54
+
<li>4.0 through 4.0.1</li>
55
+
<li>3.0 through 3.0.13</li>
56
+
<li>2.1 through 2.1.14</li>
57
+
</ul>
58
+
</p>
59
+
60
+
<p>
61
+
<b>Solution</b>
62
+
</p>
63
+
<p>
64
+
<ul>
65
+
<li>Users are recommended to upgrade to version 4.0.2 / 3.0.14 which fix this issue.</li>
66
+
</ul>
67
+
</p>
68
+
69
+
<p>
70
+
<b>Fixed in</b>
71
+
</p>
72
+
<p>
73
+
<ul>
74
+
<li>Release 4.0.2</li>
75
+
<li>Release 3.0.14</li>
76
+
</ul>
77
+
</p>
78
+
79
+
<p>Read the <ahref="https://www.cve.org/CVERecord?id=CVE-2025-57738">full CVE advisory</a>.</p>
80
+
</subsection>
81
+
39
82
<subsectionname="CVE-2024-45031: Apache Syncope: Stored XSS in Console and Enduser">
40
83
<p>When editing objects in the Syncope Console, incomplete HTML tags could be used to bypass HTML sanitization. This made it possible to inject stored XSS payloads which would trigger for other users during ordinary usage of the application.<br/>
41
84
XSS payloads could also be injected in Syncope Enduser when editing “Personal Information” or “User Requests”: such payloads would trigger for administrators in Syncope Console, thus enabling session hijacking.</p>
0 commit comments