First published: Wed Feb 08 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in XWiki Enterprise 3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) XWiki.XWikiComments_comment parameter to xwiki/bin/commentadd/Main/WebHome, (2) XWiki.XWikiUsers_0_company parameter when editing a user profile, or (3) projectVersion parameter to xwiki/bin/view/DownloadCode/DownloadFeedback. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki Enterprise | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1019 is considered a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2012-1019, upgrade to a patched version of XWiki Enterprise that addresses these cross-site scripting vulnerabilities.
CVE-2012-1019 can be exploited to execute arbitrary web scripts or HTML, allowing for session hijacking or phishing attacks.
CVE-2012-1019 specifically affects XWiki Enterprise version 3.4.
Yes, CVE-2012-1019 poses a risk to user data security by enabling attackers to inject malicious scripts that could compromise user sessions.