First published: Thu Jan 06 2022(Updated: )
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Pluto | <3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36738 is classified as a high severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To fix CVE-2021-36738, users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact.
CVE-2021-36738 is vulnerable to Cross-Site Scripting (XSS) attacks, allowing attackers to execute arbitrary scripts in the context of a user's session.
CVE-2021-36738 affects the Apache Pluto version prior to 3.1.1, specifically the JSP version of the applicant MVCBean CDI portlet.
Yes, the input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are the source of the XSS vulnerability in CVE-2021-36738.