First published: Thu Jan 06 2022(Updated: )
The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Pluto | <3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the Cross-Site Scripting (XSS) vulnerability in Apache Pluto UrlTestPortlet is CVE-2021-36737.
CVE-2021-36737 has a severity value of 6.1, classified as medium severity.
The Apache Pluto version up to 3.1.1 is affected by the CVE-2021-36737 vulnerability.
Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact to mitigate the CVE-2021-36737 vulnerability.
The CWE associated with CVE-2021-36737 is CWE-79.