In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
References
Link | Resource |
---|---|
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224 | Vendor Advisory |
https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/107631 | Third Party Advisory VDB Entry |
https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E | Mailing List Patch Vendor Advisory |
https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-03-28 14:29
Updated : 2019-05-19 11:29
NVD link : CVE-2019-0224
Mitre link : CVE-2019-0224
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
apache
- jspwiki