Description
Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
Published: 2021-11-24
Score: 9.1 Critical
EPSS: 5.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Apache JSPWiki users should upgrade to 2.11.0 or later.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-2323 Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
Github GHSA Github GHSA GHSA-8gw6-w5rw-4g5c Incorrect Default Permissions in Apache JSPWiki
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T04:17:24.421Z

Reserved: 2021-11-22T00:00:00.000Z

Link: CVE-2021-44140

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-24T12:15:07.663

Modified: 2024-11-21T06:30:25.367

Link: CVE-2021-44140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses