Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-50151

Опубликовано: 21 июл. 2025
Источник: debian
EPSS Низкий

Описание

File access paths in configuration files uploaded by users with administrator access are not validated. This issue affects Apache Jena version up to 5.4.0. Users are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache-jenaunfixedpackage
apache-jenano-dsatrixiepackage
apache-jenano-dsabookwormpackage

Примечания

  • https://lists.apache.org/thread/12gks5z40gh9bszn1xk8mz34gz586xss

EPSS

Процентиль: 42%
0.00193
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
5 месяцев назад

File access paths in configuration files uploaded by users with administrator access are not validated. This issue affects Apache Jena version up to 5.4.0. Users are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.

CVSS3: 6.5
redhat
5 месяцев назад

File access paths in configuration files uploaded by users with administrator access are not validated. This issue affects Apache Jena version up to 5.4.0. Users are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.

CVSS3: 8.8
nvd
5 месяцев назад

File access paths in configuration files uploaded by users with administrator access are not validated. This issue affects Apache Jena version up to 5.4.0. Users are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.

CVSS3: 7.2
github
5 месяцев назад

Apache Jena doesn't validate file access paths in configuration files uploaded by users with administrator access

EPSS

Процентиль: 42%
0.00193
Низкий