The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3qp6-m7hp-jrwf Cross-site Scripting in Apache Pluto
Fixes

Solution

No solution given by the vendor.


Workaround

If a project was generated from the affected maven archetype using a command like the following: mvn archetype:generate \ -DarchetypeGroupId=org.apache.portals.pluto.archetype \ -DarchetypeArtifactId=mvcbean-jsp-portlet-archetype \ -DarchetypeVersion=3.1.0 \ -DgroupId=com.mycompany \ -DartifactId=com.mycompany.my.mvcbean.jsp.portlet Then developers must fix the generated greeting.jspx file by escaping the rendered values submitted to the "First Name" and "Last Name" fields. For example, change: <span>${user.firstName} ${user.lastName}! </span> To: <span>${mvc.encoders.html(user.firstName)} ${mvc.encoders.html(user.lastName)}! </span> Moving forward, all such projects should be generated from version 3.1.1 of the Maven archetype.

History

Thu, 22 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-05-22T18:35:31.820Z

Reserved: 2021-07-14T00:00:00.000Z

Link: CVE-2021-36739

cve-icon Vulnrichment

Updated: 2024-08-04T01:01:59.033Z

cve-icon NVD

Status : Modified

Published: 2022-01-06T09:15:07.327

Modified: 2025-05-22T19:15:24.887

Link: CVE-2021-36739

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.