First published: Thu Mar 28 2019(Updated: )
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache JSPWiki | >=2.9.0<=2.10.5 | |
Apache JSPWiki | =2.11.0-milestone1 | |
Apache JSPWiki | =2.11.0-milestone1-rc1 | |
Apache JSPWiki | =2.11.0-milestone1-rc2 | |
Apache JSPWiki | =2.11.0-milestone1-rc3 | |
Apache JSPWiki | =2.11.0-milestone2 | |
Apache JSPWiki | =2.11.0-milestone2-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
A carefully crafted URL could execute JavaScript on another user's session.
No, an attacker cannot save any information on the server or the JSPWiki database.
No, the vulnerability only allows executing JavaScript on the attacker's browser.
Versions 2.9.0 to 2.11.0.M2 are affected.
The vulnerability has a severity rating of 6.1 (medium).