SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| org.vivoweb:vitro-project(Maven) | 0 | 1.11.0 | N/A |
CVSS Metrics