First published: Thu Apr 09 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) `xip_client.html` and (2) `xip_server.html` in `src/io/`.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-dojo-plugin | >=0.4.1<=0.4.2 | 0.4.3 |
Apache Struts 2 | =2.0.9 | |
Dojo Toolkit | =0.4.1 | |
Dojo Toolkit | =0.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6726 is considered to have a medium severity due to its potential for cross-site scripting attacks that can compromise user data.
To fix CVE-2007-6726, upgrade the Dojo Toolkit to version 0.4.3 or later.
CVE-2007-6726 affects Dojo Toolkit versions 0.4.1 and 0.4.2, as well as Apache Struts version 2.0.9.
CVE-2007-6726 allows remote attackers to perform cross-site scripting (XSS) attacks through the injection of malicious web scripts.
It is recommended to immediately upgrade to the patched version of Dojo Toolkit to mitigate the risks associated with CVE-2007-6726.