A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6527 | A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page. |
Github GHSA |
GHSA-9x9j-vrhj-v364 | Apache JSPWiki CSRF due to crafted request on UserPreferences.jsp |
Fixes
Solution
No solution given by the vendor.
Workaround
Apache JSPWiki users should upgrade to 2.11.3 or later. Installations >= 2.7.0 can also enable user management workflows' manual approval to mitigate the issue.
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T06:03:52.648Z
Reserved: 2022-04-05T00:00:00
Link: CVE-2022-28731
No data.
Status : Modified
Published: 2022-08-04T07:15:07.557
Modified: 2024-11-21T06:57:49.450
Link: CVE-2022-28731
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA