On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4660 | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. |
Github GHSA |
GHSA-p2r4-rpj8-m2p9 | Cross-site Scripting in Apache JSPWiki |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-12407 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T23:17:40.131Z
Reserved: 2019-05-28T00:00:00
Link: CVE-2019-12407
No data.
Status : Modified
Published: 2019-09-23T16:15:14.977
Modified: 2024-11-21T04:22:46.677
Link: CVE-2019-12407
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA