Description
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0683 | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. |
Github GHSA |
GHSA-3rx2-x6mx-grj3 | Cross-site scripting in Apache JSPWiki |
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T22:10:09.549Z
Reserved: 2019-03-26T00:00:00.000Z
Link: CVE-2019-10089
No data.
Status : Modified
Published: 2019-09-23T15:15:10.420
Modified: 2024-11-21T04:18:22.870
Link: CVE-2019-10089
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA