Debian Package Tracker
Register | Log in
Subscribe

libowasp-esapi-java

Enterprise Security API (ESAPI)

Choose email to subscribe with

general
  • source: libowasp-esapi-java (main)
  • version: 2.4.0.0-1
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Matthew Vernon [DMD]
  • arch: all
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.1.0-3
  • oldstable: 2.1.0-3
  • stable: 2.1.0-3.1
  • stable-bpo: 2.2.3.1-1~bpo11+1
  • testing: 2.4.0.0-1
  • unstable: 2.4.0.0-1
versioned links
  • 2.1.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.1.0-3.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.2.3.1-1~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.0.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libowasp-esapi-java
  • libowasp-esapi-java-doc
action needed
2 security issues in stretch high

There are 2 open security issues in stretch.

2 important issues:
  • CVE-2022-23457: ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
  • CVE-2022-24891: ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Created: 2022-04-29 Last update: 2022-05-05 06:30
2 security issues in buster high

There are 2 open security issues in buster.

2 important issues:
  • CVE-2022-23457: ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
  • CVE-2022-24891: ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Created: 2022-04-29 Last update: 2022-05-05 06:30
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2022-23457: ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
  • CVE-2022-24891: ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Created: 2022-04-29 Last update: 2022-05-05 06:30
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-05-05 Last update: 2022-05-16 07:46
lintian reports 10 warnings normal
Lintian reports 10 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-10-23 Last update: 2021-10-23 20:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0).
Created: 2022-05-11 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2022-05-05] libowasp-esapi-java 2.4.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-29] Accepted libowasp-esapi-java 2.4.0.0-1 (source) into unstable (Markus Koschany)
  • [2022-01-06] Accepted libowasp-esapi-java 2.2.3.1-1~bpo11+1 (source all) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Markus Koschany)
  • [2021-10-18] libowasp-esapi-java 2.2.3.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-10-12] Accepted libowasp-esapi-java 2.2.3.1-1 (source) into unstable (Markus Koschany)
  • [2021-01-14] libowasp-esapi-java 2.1.0-3.1 MIGRATED to testing (Debian testing watch)
  • [2021-01-08] Accepted libowasp-esapi-java 2.1.0-3.1 (source) into unstable (Holger Levsen)
  • [2016-06-26] libowasp-esapi-java 2.1.0-3 MIGRATED to testing (Debian testing watch)
  • [2016-06-20] Accepted libowasp-esapi-java 2.1.0-3 (source all) into unstable (Emmanuel Bourg)
  • [2014-06-14] libowasp-esapi-java 2.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2014-06-03] Accepted libowasp-esapi-java 2.1.0-2 (source all) (Matthew Vernon)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 10)
  • buildd: logs, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.4.0.0-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing