A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468.
References
Link | Resource |
---|---|
https://vuldb.com/?id.216468 | Third Party Advisory VDB Entry |
https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c174 | Patch Third Party Advisory |
https://github.com/siwapp/siwapp-ror/pull/365 | Not Applicable |
https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2022-12-21 11:15
Updated : 2022-12-28 10:50
NVD link : CVE-2021-4266
Mitre link : CVE-2021-4266
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
hitachi
- community_plugin_framework