First published: Thu Mar 20 2014(Updated: )
JBoss Seam response envelopes include unsanitized parameter and id names provided in the request. This allows a request to inject arbitrary XML into the response. A remote attacker could use this flaw to perform reflected cross-site scripting attacks, provided the JBoss Seam remoting application does not apply any cross-site request forgery (CSRF) protection.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jboss-seam-remoting 2.3.3.Final-redhat | <2 | 2 |
Redhat Jboss Web Framework Kit | =2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.