Skip to content

Commit caa57de

Browse files
committed
Updating security page
1 parent 943258a commit caa57de

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed

src/site/xdoc/security.xml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,49 @@ under the License.
3636

3737
<p>If you want to report a vulnerability, please follow <a href="https://www.apache.org/security/">the procedure</a>.</p>
3838

39+
<subsection name="CVE-2025-57738: Apache Syncope: Remote Code Execution by delegated administrators">
40+
<p>Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly attractive as the machinery is set for runtime reload.
41+
Such a feature has been available for a while, but recently it was discovered that a malicious administrator can inject Groovy code that can be executed remotely by a running Apache Syncope Core instance.
42+
Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this issue by forcing the Groovy code to run in a sandbox.</p>
43+
44+
<p>
45+
<b>Severity</b>
46+
</p>
47+
<p>Moderate</p>
48+
49+
<p>
50+
<b>Affects</b>
51+
</p>
52+
<p>
53+
<ul>
54+
<li>4.0 through 4.0.1</li>
55+
<li>3.0 through 3.0.13</li>
56+
<li>2.1 through 2.1.14</li>
57+
</ul>
58+
</p>
59+
60+
<p>
61+
<b>Solution</b>
62+
</p>
63+
<p>
64+
<ul>
65+
<li>Users are recommended to upgrade to version 4.0.2 / 3.0.14 which fix this issue.</li>
66+
</ul>
67+
</p>
68+
69+
<p>
70+
<b>Fixed in</b>
71+
</p>
72+
<p>
73+
<ul>
74+
<li>Release 4.0.2</li>
75+
<li>Release 3.0.14</li>
76+
</ul>
77+
</p>
78+
79+
<p>Read the <a href="https://www.cve.org/CVERecord?id=CVE-2025-57738">full CVE advisory</a>.</p>
80+
</subsection>
81+
3982
<subsection name="CVE-2024-45031: Apache Syncope: Stored XSS in Console and Enduser">
4083
<p>When editing objects in the Syncope Console, incomplete HTML tags could be used to bypass HTML sanitization. This made it possible to inject stored XSS payloads which would trigger for other users during ordinary usage of the application.<br/>
4184
XSS payloads could also be injected in Syncope Enduser when editing “Personal Information” or “User Requests”: such payloads would trigger for administrators in Syncope Console, thus enabling session hijacking.</p>

0 commit comments

Comments
 (0)