Description
A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
No analysis available yet.
Remediation
Vendor Workaround
Apache JSPWiki users should upgrade to 2.11.3 or later.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6578 | A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page. |
Github GHSA |
GHSA-jp3m-p26h-mm7v | Apache JSPWiki CSRF due to crafted invocation on the Image plugin |
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-34158 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T08:16:17.225Z
Reserved: 2022-06-20T00:00:00.000Z
Link: CVE-2022-34158
No data.
Status : Modified
Published: 2022-08-04T07:15:07.650
Modified: 2024-11-21T07:08:58.297
Link: CVE-2022-34158
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA