Description
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
No analysis available yet.
Remediation
Vendor Workaround
Applications based on Apache Velocity Tools should upgrade to version 3.1. This version escapes the reflected text on the default error page, preventing potential javascript execution.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2597-1 | velocity-tools security update |
EUVD |
EUVD-2021-0652 | The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks. |
Github GHSA |
GHSA-fh63-4r66-jc7v | Cross-site scripting (XSS) in Apache Velocity Tools |
Ubuntu USN |
USN-6282-1 | Velocity Tools vulnerability |
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:31.176Z
Reserved: 2020-06-08T00:00:00.000Z
Link: CVE-2020-13959
No data.
Status : Modified
Published: 2021-03-10T08:15:14.760
Modified: 2024-11-21T05:02:14.527
Link: CVE-2020-13959
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN