On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0700 | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. |
Github GHSA |
GHSA-g6ww-2x43-h963 | Cross-site scripting in Apache JSPWiki |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10090 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T22:10:09.441Z
Reserved: 2019-03-26T00:00:00
Link: CVE-2019-10090
No data.
Status : Modified
Published: 2019-09-23T16:15:14.647
Modified: 2024-11-21T04:18:23.003
Link: CVE-2019-10090
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA