First published: Fri Apr 17 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Geronimo | =2.1.2 | |
Apache Geronimo | =2.1.1 | |
Apache Geronimo | =2.1 | |
Apache Geronimo | =2.1.3 | |
maven/org.apache.geronimo.plugins:console | >=2.1.0<2.1.4 | 2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.