There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
Workaround:
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Link | Tags |
---|---|
https://lists.apache.org/thread/s0dmpsxcwqs57l4qfs415klkgmhdxq7s | vendor advisory mailing list issue tracking |
http://www.openwall.com/lists/oss-security/2023/07/11/11 | third party advisory mailing list |