Enterprise Security Api OWASP Enterprise Security Api

Do you want an email whenever new security vulnerabilities are reported in OWASP Enterprise Security Api?

By the Year

In 2024 there have been 0 vulnerabilities in OWASP Enterprise Security Api . Enterprise Security Api did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 2 7.95
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Enterprise Security Api vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent OWASP Enterprise Security Api Security Vulnerabilities

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library

CVE-2022-24891 6.1 - Medium - April 27, 2022

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library

CVE-2022-23457 9.8 - Critical - April 25, 2022

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

Directory traversal

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for NetApp Active Iq Unified Manager or by OWASP? Click the Watch button to subscribe.

OWASP
Vendor

subscribe