Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-22665

There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 62.1%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2023-22665
  • Apache » Jena » Version: 3.10.0
    cpe:2.3:a:apache:jena:3.10.0
  • Apache » Jena » Version: 3.11.0
    cpe:2.3:a:apache:jena:3.11.0
  • Apache » Jena » Version: 3.12.0
    cpe:2.3:a:apache:jena:3.12.0
  • Apache » Jena » Version: 3.13.0
    cpe:2.3:a:apache:jena:3.13.0
  • Apache » Jena » Version: 3.13.1
    cpe:2.3:a:apache:jena:3.13.1
  • Apache » Jena » Version: 3.14.0
    cpe:2.3:a:apache:jena:3.14.0
  • Apache » Jena » Version: 3.15.0
    cpe:2.3:a:apache:jena:3.15.0
  • Apache » Jena » Version: 3.16.0
    cpe:2.3:a:apache:jena:3.16.0
  • Apache » Jena » Version: 3.17.0
    cpe:2.3:a:apache:jena:3.17.0
  • Apache » Jena » Version: 3.7.0
    cpe:2.3:a:apache:jena:3.7.0
  • Apache » Jena » Version: 3.8.0
    cpe:2.3:a:apache:jena:3.8.0
  • Apache » Jena » Version: 3.9.0
    cpe:2.3:a:apache:jena:3.9.0
  • Apache » Jena » Version: 4.0.0
    cpe:2.3:a:apache:jena:4.0.0
  • Apache » Jena » Version: 4.1.0
    cpe:2.3:a:apache:jena:4.1.0
  • Apache » Jena » Version: 4.2.0
    cpe:2.3:a:apache:jena:4.2.0
  • Apache » Jena » Version: 4.4.0
    cpe:2.3:a:apache:jena:4.4.0
  • Apache » Jena » Version: 4.7.0
    cpe:2.3:a:apache:jena:4.7.0
  • Apache » Jena » Version: 4.8.0
    cpe:2.3:a:apache:jena:4.8.0


Contact Us

Shodan ® - All rights reserved