Maven package
org.apache.archiva/archiva
pkg:maven/org.apache.archiva/archiva
Vulnerabilities (11)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-27138 | — | <= 2.2.10 | — | Mar 1, 2024 | ** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva. Apache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archi | ||
| CVE-2024-27139 | — | >= 2.0.0, <= 2.2.10 | — | Mar 1, 2024 | ** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover. This issue affects Apache Archiva: from 2.0.0. As this | ||
| CVE-2023-28158 | — | >= 2.0.0, < 2.2.10 | 2.2.10 | Mar 29, 2023 | Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user. | ||
| CVE-2022-29405 | — | < 2.2.8 | 2.2.8 | May 25, 2022 | In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8 | ||
| CVE-2020-9495 | — | < 2.2.5 | 2.2.5 | Jun 19, 2020 | Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to que | ||
| CVE-2019-0214 | — | >= 2.2.0, < 2.2.4 | 2.2.4 | Apr 30, 2019 | In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | ||
| CVE-2019-0213 | — | < 2.2.4 | 2.2.4 | Apr 30, 2019 | In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browse | ||
| CVE-2017-5657 | Hig | 8.0 | < 2.2.3 | 2.2.3 | May 22, 2017 | Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same righ | |
| CVE-2016-5005 | Med | 4.8 | < 2.2.1 | 2.2.1 | Jul 28, 2016 | Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action. | |
| CVE-2011-0533 | — | >= 1.0, < 1.3.4 | 1.3.4 | Feb 17, 2011 | Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParamete | ||
| CVE-2010-4408 | — | >= 1.0, < 1.3.2 | 1.3.2 | Dec 6, 2010 | Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a ( |
- CVE-2024-27138Mar 1, 2024affected <= 2.2.10
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva. Apache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archi
- CVE-2024-27139Mar 1, 2024affected >= 2.0.0, <= 2.2.10
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover. This issue affects Apache Archiva: from 2.0.0. As this
- CVE-2023-28158Mar 29, 2023affected >= 2.0.0, < 2.2.10fixed 2.2.10
Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
- CVE-2022-29405May 25, 2022affected < 2.2.8fixed 2.2.8
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
- CVE-2020-9495Jun 19, 2020affected < 2.2.5fixed 2.2.5
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to que
- CVE-2019-0214Apr 30, 2019affected >= 2.2.0, < 2.2.4fixed 2.2.4
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
- CVE-2019-0213Apr 30, 2019affected < 2.2.4fixed 2.2.4
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browse
- affected < 2.2.3fixed 2.2.3
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same righ
- affected < 2.2.1fixed 2.2.1
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.3.9 and earlier allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.
- CVE-2011-0533Feb 17, 2011affected >= 1.0, < 1.3.4fixed 1.3.4
Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParamete
- CVE-2010-4408Dec 6, 2010affected >= 1.0, < 1.3.2fixed 1.3.2
Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (