First published: Mon May 20 2019(Updated: )
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache JSPWiki | >=2.9.0<=2.11.0 | |
Apache JSPWiki | =2.11.0-m1 | |
Apache JSPWiki | =2.11.0-m1-rc1 | |
Apache JSPWiki | =2.11.0-m1-rc2 | |
Apache JSPWiki | =2.11.0-m1.rc3 | |
Apache JSPWiki | =2.11.0-m2 | |
Apache JSPWiki | =2.11.0-m2-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10076 is an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3 that can be triggered by a malicious attachment.
The severity of CVE-2019-10076 is medium with a CVSS score of 6.1.
To exploit CVE-2019-10076, an attacker would need to craft a malicious attachment and trigger the XSS vulnerability.
Session hijacking can occur with CVE-2019-10076 if an attacker successfully exploits the XSS vulnerability, allowing them to hijack user sessions.
To fix CVE-2019-10076, upgrade your Apache JSPWiki software to a version that is not affected by the vulnerability.