First published: Tue Jul 14 2009(Updated: )
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Application Platform | =4.3-cp01 | |
Redhat Jboss Enterprise Application Platform | =4.2-cp03 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp01 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp06 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp01 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp05 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp04 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp04 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp03 | |
Redhat Jboss Enterprise Application Platform | =4.2-cp02 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp07 | |
Redhat Jboss Enterprise Application Platform | =4.2-cp01 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp03 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp02 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.