Description
A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
Published: 2022-08-04
Score: 8.8 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Apache JSPWiki users should upgrade to 2.11.3 or later.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-6578 A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
Github GHSA Github GHSA GHSA-jp3m-p26h-mm7v Apache JSPWiki CSRF due to crafted invocation on the Image plugin
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T08:16:17.225Z

Reserved: 2022-06-20T00:00:00.000Z

Link: CVE-2022-34158

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-04T07:15:07.650

Modified: 2024-11-21T07:08:58.297

Link: CVE-2022-34158

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses