Description
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Published: 2019-09-23
Score: 6.1 Medium
EPSS: 4.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4660 On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Github GHSA Github GHSA GHSA-p2r4-rpj8-m2p9 Cross-site Scripting in Apache JSPWiki
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T23:17:40.131Z

Reserved: 2019-05-28T00:00:00.000Z

Link: CVE-2019-12407

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-23T16:15:14.977

Modified: 2024-11-21T04:22:46.677

Link: CVE-2019-12407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses