Author: ilgrosso
Date: Fri Nov  7 11:26:16 2025
New Revision: 1929578

Log:
Two new committers in, updating team page

Modified:
   syncope/site/security.html
   syncope/site/team.html

Modified: syncope/site/security.html
==============================================================================
--- syncope/site/security.html  Fri Nov  7 10:52:00 2025        (r1929577)
+++ syncope/site/security.html  Fri Nov  7 11:26:16 2025        (r1929578)
@@ -97,69 +97,70 @@
       
 <p>If you want to report a vulnerability, please follow <a 
href="https://www.apache.org/security/"; class="externalLink">the 
procedure</a>.</p>
 
-      <section><a id="CVE-2025-57738"></a>
+      <section><a 
id="CVE-2025-57738.3A_Apache_Syncope.3A_Remote_Code_Execution_by_delegated_administrators"></a>
 <h2>CVE-2025-57738: Apache Syncope: Remote Code Execution by delegated 
administrators</h2>
-
+        
 <p>Apache Syncope offers the ability to extend / customize the base behavior 
on every deployment by allowing to provide custom implementations of a few Java 
interfaces; such implementations can be provided either as Java or Groovy 
classes, with the latter being particularly attractive as the machinery is set 
for runtime reload.
 Such a feature has been available for a while, but recently it was discovered 
that a malicious administrator can inject Groovy code that can be executed 
remotely by a running Apache Syncope Core instance.
 Users are recommended to upgrade to version 3.0.14 / 4.0.2, which fix this 
issue by forcing the Groovy code to run in a sandbox.</p>
 
-
+        
 <p>
           <b>Severity</b>
         </p>
-
+        
 <p>Moderate</p>
 
-
+        
 <p>
           <b>Affects</b>
         </p>
-
+        
 <p>
           </p>
 <ul>
-
+            
 <li>4.0 through 4.0.1</li>
-
+            
 <li>3.0 through 3.0.13</li>
-
+            
 <li>2.1 through 2.1.14</li>
           </ul>
+        
 
-
-
+        
 <p>
           <b>Solution</b>
         </p>
-
+        
 <p>
           </p>
 <ul>
-
+            
 <li>Users are recommended to upgrade to version 4.0.2 / 3.0.14 which fix this 
issue.</li>
           </ul>
+        
 
-
-
+        
 <p>
           <b>Fixed in</b>
         </p>
-
+        
 <p>
           </p>
 <ul>
-
+            
 <li>Release 4.0.2</li>
+            
 <li>Release 3.0.14</li>
           </ul>
+        
 
-
-
+        
 <p>Read the <a href="https://www.cve.org/CVERecord?id=CVE-2025-57738"; 
class="externalLink">full CVE advisory</a>.</p>
       </section>
 
-<section><a 
id="CVE-2024-45031.3A_Apache_Syncope.3A_Stored_XSS_in_Console_and_Enduser"></a>
+      <section><a 
id="CVE-2024-45031.3A_Apache_Syncope.3A_Stored_XSS_in_Console_and_Enduser"></a>
 <h2>CVE-2024-45031: Apache Syncope: Stored XSS in Console and Enduser</h2>
         
 <p>When editing objects in the Syncope Console, incomplete HTML tags could be 
used to bypass HTML sanitization. This made it possible to inject stored XSS 
payloads which would trigger for other users during ordinary usage of the 
application.<br />

Modified: syncope/site/team.html
==============================================================================
--- syncope/site/team.html      Fri Nov  7 10:52:00 2025        (r1929577)
+++ syncope/site/team.html      Fri Nov  7 11:26:16 2025        (r1929578)
@@ -302,7 +302,25 @@
 <td>-</td>
 <td>Tirasa</td>
 <td><a class="externalLink" 
href="https://www.tirasa.net/";>https://www.tirasa.net/</a></td>
-<td>PMC member</td></tr></table></section><section><a id="Contributors"></a>
+<td>PMC member</td></tr>
+<tr class="a">
+<td><figure><img src="avatars/00000000000000000000000000000000.jpg" 
/></figure></td>
+<td><a id="matato"></a>matato</td>
+<td>Matteo Tatoni</td>
+<td><a class="externalLink" 
href="mailto:[email protected]";>[email protected]</a></td>
+<td>-</td>
+<td>Tirasa</td>
+<td><a class="externalLink" 
href="https://www.tirasa.net/";>https://www.tirasa.net/</a></td>
+<td>committer</td></tr>
+<tr class="b">
+<td><figure><img src="avatars/00000000000000000000000000000000.jpg" 
/></figure></td>
+<td><a id="abogi"></a>abogi</td>
+<td>Alberto Bogi</td>
+<td><a class="externalLink" 
href="mailto:[email protected]";>[email protected]</a></td>
+<td>-</td>
+<td>Tirasa</td>
+<td><a class="externalLink" 
href="https://www.tirasa.net/";>https://www.tirasa.net/</a></td>
+<td>committer</td></tr></table></section><section><a id="Contributors"></a>
 <h2>Contributors</h2>
 <p>The following additional people have contributed to this project through 
the way of suggestions, patches or documentation.</p>
 <table class="table table-striped">

Reply via email to