First published: Fri Feb 14 2014(Updated: )
It was found that Mojarra JSF would not properly escape user-supplied content in certain circumstances. The contents of outputText tags and raw EL expressions that immediately follow <script> or <style> elements were not escaped. If a remote attacker could trick a user into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the user's browser.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Mojarra JavaServer Faces | =2.1.0 | |
Oracle Mojarra JavaServer Faces | =2.1.1 | |
Oracle Mojarra JavaServer Faces | =2.1.2 | |
Oracle Mojarra JavaServer Faces | =2.1.3 | |
Oracle Mojarra JavaServer Faces | =2.1.4 | |
Oracle Mojarra JavaServer Faces | =2.1.5 | |
Oracle Mojarra JavaServer Faces | =2.1.6 | |
Oracle Mojarra JavaServer Faces | =2.1.7 | |
Oracle Mojarra JavaServer Faces | =2.1.8 | |
Oracle Mojarra JavaServer Faces | =2.1.9 | |
Oracle Mojarra JavaServer Faces | =2.1.10 | |
Oracle Mojarra JavaServer Faces | =2.1.11 | |
Oracle Mojarra JavaServer Faces | =2.1.12 | |
Oracle Mojarra JavaServer Faces | =2.1.13 | |
Oracle Mojarra JavaServer Faces | =2.1.14 | |
Oracle Mojarra JavaServer Faces | =2.1.15 | |
Oracle Mojarra JavaServer Faces | =2.1.16 | |
Oracle Mojarra JavaServer Faces | =2.1.17 | |
Oracle Mojarra JavaServer Faces | =2.1.18 | |
Oracle Mojarra JavaServer Faces | =2.1.19 | |
Oracle Mojarra JavaServer Faces | =2.1.20 | |
Oracle Mojarra JavaServer Faces | =2.1.21 | |
Oracle Mojarra JavaServer Faces | =2.1.22 | |
Oracle Mojarra JavaServer Faces | =2.1.23 | |
Oracle Mojarra JavaServer Faces | =2.1.24 | |
Oracle Mojarra JavaServer Faces | =2.1.25 | |
Oracle Mojarra JavaServer Faces | =2.1.26 | |
Oracle Mojarra JavaServer Faces | =2.1.27 | |
Oracle Mojarra JavaServer Faces | =2.2.0 | |
Oracle Mojarra JavaServer Faces | =2.2.1 | |
Oracle Mojarra JavaServer Faces | =2.2.2 | |
Oracle Mojarra JavaServer Faces | =2.2.3 | |
Oracle Mojarra JavaServer Faces | =2.2.4 | |
Oracle Mojarra JavaServer Faces | =2.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-5855 is considered medium due to its potential exploitation through cross-site scripting (XSS).
To fix CVE-2013-5855, upgrade Mojarra JSF to versions 2.2.0 or later where the issue has been addressed.
CVE-2013-5855 affects Mojarra JSF versions 2.1.0 through 2.1.27.
If upgrading is not possible, consider implementing input sanitization and output encoding to mitigate the risk of XSS attacks.
CVE-2013-5855 can allow attackers to inject malicious scripts, compromising the security of web applications and exposing user data.