Apache Shenyu vulnerabilities

9 known vulnerabilities affecting apache/shenyu.

Total CVEs
9
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH5MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2023-25753MEDIUMCVSS 6.5v2.5.12023-10-19
CVE-2023-25753 [MEDIUM] CWE-918 CVE-2023-25753: There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGatew There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter. Of particular concern is our ability to exert control over the HTTP method, cookies, IP
nvd
CVE-2022-42735HIGHCVSS 8.8v2.5.02023-02-15
CVE-2022-42735 [HIGH] CWE-269 CVE-2022-42735: Improper Privilege Management vulnerability in Apache Software Foundation Apache ShenYu. ShenYu Ad Improper Privilege Management vulnerability in Apache Software Foundation Apache ShenYu. ShenYu Admin allows low-privilege low-level administrators create users with higher privileges than their own. This issue affects Apache ShenYu: 2.5.0. Upgrade to Apache ShenYu 2.5.1 or apply patch https://github.com/apache/shenyu/pull/3958 https://github.com/
nvd
CVE-2022-37435HIGHCVSS 8.8v2.4.2v2.4.32022-09-01
CVE-2022-37435 [HIGH] CWE-732 CVE-2022-37435: Apache ShenYu Admin has insecure permissions, which may allow low-privilege administrators to modify Apache ShenYu Admin has insecure permissions, which may allow low-privilege administrators to modify high-privilege administrator's passwords. This issue affects Apache ShenYu 2.4.2 and 2.4.3.
nvd
CVE-2022-26650HIGHCVSS 7.5v2.4.0v2.4.1+1 more2022-05-17
CVE-2022-26650 [HIGH] CWE-1333 CVE-2022-26650: In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.get In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating)
nvd
CVE-2022-23944CRITICALCVSS 9.1PoCv2.4.0v2.4.12022-01-25
CVE-2022-23944 [CRITICAL] CWE-862 CVE-2022-23944: User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4. User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
nvd
CVE-2021-45029CRITICALCVSS 9.8v2.4.0v2.4.12022-01-25
CVE-2021-45029 [CRITICAL] CWE-94 CVE-2021-45029: Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apac Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
nvd
CVE-2022-23945HIGHCVSS 7.5v2.4.0v2.4.12022-01-25
CVE-2022-23945 [HIGH] CWE-862 CVE-2022-23945: Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4. Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
nvd
CVE-2022-23223HIGHCVSS 7.5v2.4.0v2.4.12022-01-25
CVE-2022-23223 [HIGH] CWE-522 CVE-2022-23223: On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
nvd
CVE-2021-37580CRITICALCVSS 9.8PoCv2.3.0v2.4.02021-11-16
CVE-2021-37580 [CRITICAL] CWE-287 CVE-2021-37580: A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
nvd