There is insufficient restrictions of called script functions in Apache Jena versions 4.8.0 and earlier. It allows a remote user to execute javascript via a SPARQL query. This issue affects Apache Jena: from 3.7.0 through 4.8.0.
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Link | Tags |
---|---|
https://www.cve.org/CVERecord?id=CVE-2023-22665 | related third party advisory |
https://lists.apache.org/thread/7hg0t2kws3fyr75dl7lll8389xzzc46z | mailing list third party advisory vendor advisory |