First published: Wed Dec 21 2022(Updated: )
A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Community Plugin Framework | <9.5.0.0-81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-4266 is medium (6.1).
CVE-2021-4266 affects Webdetails cpf versions up to 9.5.0.0-80.
The CWE ID for CVE-2021-4266 is 79, 707, 74.
To fix CVE-2021-4266, update Webdetails cpf to version 9.5.0.0-81 or later.
You can find more information about CVE-2021-4266 at the following references: [Reference 1](https://github.com/siwapp/siwapp-ror/pull/365), [Reference 2](https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c174), [Reference 3](https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81).