Debian dla-4246 : libowasp-esapi-java - security update

medium Nessus Plugin ID 242493

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has a package installed that is affected by multiple vulnerabilities as referenced in the dla-4246 advisory.

------------------------------------------------------------------------- Debian LTS Advisory DLA-4246-1 [email protected] https://www.debian.org/lts/security/ Markus Koschany July 22, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : libowasp-esapi-java Version : 2.4.0.0-0+deb11u1 CVE ID : CVE-2022-23457 CVE-2022-24891 CVE-2025-5878 Debian Bug : 1010339 1109378

Several security vulnerabilities have been discovered in libowasp-esapi-java, a Java Enterprise Security API.

CVE-2022-23457:

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to this update the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.

CVE-2022-24891:

There is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for onsiteURL in the
**antisamy-esapi.xml** configuration file that can cause javascript: URLs to fail to be correctly sanitized.

CVE-2025-5878:

This issue affects the interface Encoder.encodeForSQL of the SQL Injection Defense. An attack leads to an improper neutralization of special elements. We are not aware of any affected reverse-dependencies in Debian but if you use ESAPI in a stand-alone project, you should be aware that the Encoder.encodeForSQL method has been deprecated and will be removed eventually. In addition the DB2Codec, MySQLCodec and OracleCodec classes have been deprecated too. We recommend to carefully assess if your project might be affected by these classes and methods and if you have to implement additional steps to secure your application. The update does not automatically protect you from any potential risks.

For Debian 11 bullseye, these problems have been fixed in version 2.4.0.0-0+deb11u1.

We recommend that you upgrade your libowasp-esapi-java packages.

For the detailed security status of libowasp-esapi-java please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/libowasp-esapi-java

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: This is a digitally signed message part

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the libowasp-esapi-java packages.

See Also

http://www.nessus.org/u?5870ac73

https://security-tracker.debian.org/tracker/CVE-2022-23457

https://security-tracker.debian.org/tracker/CVE-2022-24891

https://security-tracker.debian.org/tracker/CVE-2025-5878

https://packages.debian.org/source/bullseye/libowasp-esapi-java

Plugin Details

Severity: Medium

ID: 242493

File Name: debian_DLA-4246.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/22/2025

Updated: 7/22/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-23457

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Threat Score: 5.5

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-5878

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libowasp-esapi-java, cpe:/o:debian:debian_linux:11.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/22/2025

Vulnerability Publication Date: 4/25/2022

Reference Information

CVE: CVE-2022-23457, CVE-2022-24891, CVE-2025-5878