Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
GHSA-3qp6-m7hp-jrwf | Cross-site Scripting in Apache Pluto |
Solution
No solution given by the vendor.
Workaround
If a project was generated from the affected maven archetype using a command like the following: mvn archetype:generate \ -DarchetypeGroupId=org.apache.portals.pluto.archetype \ -DarchetypeArtifactId=mvcbean-jsp-portlet-archetype \ -DarchetypeVersion=3.1.0 \ -DgroupId=com.mycompany \ -DartifactId=com.mycompany.my.mvcbean.jsp.portlet Then developers must fix the generated greeting.jspx file by escaping the rendered values submitted to the "First Name" and "Last Name" fields. For example, change: <span>${user.firstName} ${user.lastName}! </span> To: <span>${mvc.encoders.html(user.firstName)} ${mvc.encoders.html(user.lastName)}! </span> Moving forward, all such projects should be generated from version 3.1.1 of the Maven archetype.
Thu, 22 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-22T18:35:31.820Z
Reserved: 2021-07-14T00:00:00.000Z
Link: CVE-2021-36739

Updated: 2024-08-04T01:01:59.033Z

Status : Modified
Published: 2022-01-06T09:15:07.327
Modified: 2025-05-22T19:15:24.887
Link: CVE-2021-36739

No data.

No data.