First published: Fri Feb 14 2014(Updated: )
It was found that Mojarra JSF would not properly escape user-supplied content in certain circumstances. The contents of outputText tags and raw EL expressions that immediately follow <script> or <style> elements were not escaped. If a remote attacker could trick a user into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the user's browser.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Mojarra | =2.1.0 | |
Oracle Mojarra | =2.1.1 | |
Oracle Mojarra | =2.1.2 | |
Oracle Mojarra | =2.1.3 | |
Oracle Mojarra | =2.1.4 | |
Oracle Mojarra | =2.1.5 | |
Oracle Mojarra | =2.1.6 | |
Oracle Mojarra | =2.1.7 | |
Oracle Mojarra | =2.1.8 | |
Oracle Mojarra | =2.1.9 | |
Oracle Mojarra | =2.1.10 | |
Oracle Mojarra | =2.1.11 | |
Oracle Mojarra | =2.1.12 | |
Oracle Mojarra | =2.1.13 | |
Oracle Mojarra | =2.1.14 | |
Oracle Mojarra | =2.1.15 | |
Oracle Mojarra | =2.1.16 | |
Oracle Mojarra | =2.1.17 | |
Oracle Mojarra | =2.1.18 | |
Oracle Mojarra | =2.1.19 | |
Oracle Mojarra | =2.1.20 | |
Oracle Mojarra | =2.1.21 | |
Oracle Mojarra | =2.1.22 | |
Oracle Mojarra | =2.1.23 | |
Oracle Mojarra | =2.1.24 | |
Oracle Mojarra | =2.1.25 | |
Oracle Mojarra | =2.1.26 | |
Oracle Mojarra | =2.1.27 | |
Oracle Mojarra | =2.2.0 | |
Oracle Mojarra | =2.2.1 | |
Oracle Mojarra | =2.2.2 | |
Oracle Mojarra | =2.2.3 | |
Oracle Mojarra | =2.2.4 | |
Oracle Mojarra | =2.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.