The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jg6j-jrxv-2hh9 | Cross-site Scripting in Apache Pluto |
Fixes
Solution
No solution given by the vendor.
Workaround
* Uninstall the applicant-mvcbean-cdi-jsp-portlet.war artifact -or- * Migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T01:01:59.086Z
Reserved: 2021-07-14T00:00:00
Link: CVE-2021-36738
No data.
Status : Modified
Published: 2022-01-06T09:15:07.273
Modified: 2024-11-21T06:13:59.363
Link: CVE-2021-36738
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA