On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0683 | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. |
Github GHSA |
GHSA-3rx2-x6mx-grj3 | Cross-site scripting in Apache JSPWiki |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T22:10:09.549Z
Reserved: 2019-03-26T00:00:00
Link: CVE-2019-10089
No data.
Status : Modified
Published: 2019-09-23T15:15:10.420
Modified: 2024-11-21T04:18:22.870
Link: CVE-2019-10089
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA