On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4660 On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Github GHSA Github GHSA GHSA-p2r4-rpj8-m2p9 Cross-site Scripting in Apache JSPWiki
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T23:17:40.131Z

Reserved: 2019-05-28T00:00:00

Link: CVE-2019-12407

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-23T16:15:14.977

Modified: 2024-11-21T04:22:46.677

Link: CVE-2019-12407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.