This page lists all security vulnerabilities fixed in released versions of Apache Syncope.
Please note that binary patches are never provided. If you need to apply a source code patch, use the building instructions or re-generate your Maven project from published archetype.
If you want to report a vulnerability, please follow the procedure.
When the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and code execution.
Severity
Low
Affects
Solution
Fixed in
Read the full CVE advisory.
Vulnerability to Server-Side Template Injection on Mail templates enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.
Severity
Important
Affects
Solution
Fixed in
Read the full CVE advisory.
A Server-Side Template Injection was identified in Syncope enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
Severity
Important
Affects
Solution
Fixed in
Read the full CVE advisory.
It was found that the EndUser UI login page reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
Severity
Medium
Affects
Solution
Fixed in
Read the full CVE advisory.
An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.
Severity
Medium
Affects
The unsupported Releases 1.2.x may be also affected.
Solution
Mitigation
Do not assign workflow definition entitlements to any administrator.
Fixed in
Read the full CVE advisory.
A malicious user with enough administration entitlements can inject html-like elements containing JavaScript
statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions.
When another user with enough administration entitlements edits one of the Entities above via Admin Console,
the injected JavaScript code is executed.
Severity
Important
Affects
Solution
Fixed in
Read the full CVE advisory.
An administrator with user search entitlements can recover sensitive security values using the
fiql
and orderby
parameters.
Severity
Medium
Affects
The unsupported Releases 1.0.x, 1.1.x may be also affected.
Solution
Mitigation
Do not assign user search entitlements to any administrator.
Fixed in
Read the full CVE advisory.
An administrator with report and template entitlements can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
Severity
Medium
Affects
The unsupported Releases 1.0.x, 1.1.x may be also affected.
Solution
Mitigation
Do not assign report and template entitlements to any administrator.
Fixed in
Read the full CVE advisory.
A password is generated for a user in Apache Syncope under certain circumstances, when no existing password is found. However, the password generation code is relying on insecure Random implementations, which means that an attacker could attempt to guess a generated password.
Affects
Fixed in
Read the full CVE advisory.
In the various places in which Apache Commons JEXL expressions are allowed (derived schema definition, user / group templates, connObjectLinks of resource mappings) a malicious administrator can inject Java code that can be executed remotely by the Java EE container running the Apache Syncope core.
Affects
Fixed in
Read the full CVE advisory.