vendor:
JackRabbit
by:
ADEO Security
8,5
CVSS
HIGH
XPath Injection
79
CWE
Product Name: JackRabbit
Affected Version From: 2.0.0
Affected Version To: 2.2.6
Patch Exists: YES
Related CWE: N/A
CPE: a:apache:jackrabbit:2.0.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2010
Apache JackRabbit webapp XPath Injection
In search.jsp file HTTP GET parameter 'q' is included to XPath query without sanitisation if its start with word 'related:'. This can lead to remote code execution.
Mitigation:
Upgrade to Apache Jackrabbit 2.2.7 or later.