First published: Thu Jul 25 2024(Updated: )
Insufficient input validation and sanitation in Profile name & screenname, Bookmark name & description and blogroll name features in all versions of Apache Roller on all platforms allows an authenticated user to perform an XSS attack. Mitigation: if you do not have Roller configured for untrusted users, then you need to do nothing because you trust your users to author raw HTML and other web content. If you are running with untrusted users then you should upgrade to Roller 6.1.3. This issue affects Apache Roller: from 5.0.0 before 6.1.3. Users are recommended to upgrade to version 6.1.3, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Roller | >=5.0.0<6.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25090 is considered to have a medium severity due to the potential for XSS attacks resulting from insufficient input validation in Apache Roller.
To fix CVE-2024-25090, ensure you update your Apache Roller to a version later than 6.1.3 and properly configure input validation and sanitation.
All users of Apache Roller versions between 5.0.0 and 6.1.3 on any platform are affected by CVE-2024-25090.
CVE-2024-25090 allows authenticated users to perform cross-site scripting (XSS) attacks via the Profile name, screenname, Bookmark name, and blogroll name features.
A possible workaround for CVE-2024-25090 includes disabling features like Profile names and bookmarks until an upgrade can be applied.