Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN724
_____________________________________________________________________

DATE                : 22/10/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Syncope versions prior to
                                     3.0.14, 4.0.2.

=====================================================================
https://lists.apache.org/thread/5wbb3mc2qyb2cj1y4j104qgzmgx2swq2
_____________________________________________________________________

CVE-2025-57738: Apache Syncope: Remote Code Execution by delegated
administrators

Severity: moderate 

Affected versions:

- Apache Syncope 2.1 through 2.1.14
- Apache Syncope 3.0 through 3.0.13
- Apache Syncope 4.0 through 4.0.1


Description:

Apache Syncope offers the ability to extend / customize the base
behavior on every deployment by allowing to provide custom
implementations of a few Java interfaces; such implementations can
be provided either as Java or Groovy classes, with the latter being
particularly attractive as the machinery is set for runtime reload.
Such a feature has been available for a while, but recently it was
discovered that a malicious administrator can inject Groovy code that
can be executed remotely by a running Apache Syncope Core instance.


Users are recommended to upgrade to version 3.0.14 / 4.0.2, which
fix this issue by forcing the Groovy code to run in a sandbox.


Credit:

Mike Cole (Mantel Group) (finder)

References:

https://syncope.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-57738


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




