Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache shenyu 2.4.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2022-26650
In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causi...
Apache Shenyu 2.4.0
Apache Shenyu 2.4.1
Apache Shenyu 2.4.2
7.5
CVSSv3
CVE-2022-23223
On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
Apache Shenyu 2.4.0
Apache Shenyu 2.4.1
7.5
CVSSv3
CVE-2022-23945
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
Apache Shenyu 2.4.0
Apache Shenyu 2.4.1
9.8
CVSSv3
CVE-2021-45029
Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
Apache Shenyu 2.4.0
Apache Shenyu 2.4.1
9.1
CVSSv3
CVE-2022-23944
User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
Apache Shenyu 2.4.0
Apache Shenyu 2.4.1
9.8
CVSSv3
CVE-2021-37580
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an malicious user to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
Apache Shenyu 2.3.0
Apache Shenyu 2.4.0
9 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started