A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6578 A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
Github GHSA Github GHSA GHSA-jp3m-p26h-mm7v Apache JSPWiki CSRF due to crafted invocation on the Image plugin
Fixes

Solution

No solution given by the vendor.


Workaround

Apache JSPWiki users should upgrade to 2.11.3 or later.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T08:16:17.225Z

Reserved: 2022-06-20T00:00:00

Link: CVE-2022-34158

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-04T07:15:07.650

Modified: 2024-11-21T07:08:58.297

Link: CVE-2022-34158

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.