org.apache.jspwiki:jspwiki-main@2.11.0.M3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.jspwiki:jspwiki-main package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization. A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.12.0 or higher.

[,2.12.0)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the execute() function in WeblogPlugin.java.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Denounce class, which does not limit scripts from being executed by requests against AJAXPreview.jsp.

NOTE: This vulnerability exists due to an incomplete fix for CVE-2021-40369.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the translate() function in XHtmlElementToWikiTranslator.java, which does not limit scripts from being executed by requests against XHRHtml2Markup.jsp.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via a carefully crafted user preferences URL for submission, related to the user preferences screen.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.2 or higher.

[,2.11.2)
  • M
Cross-site Request Forgery (CSRF)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the UserProfile.jsp component, which does not require you to type in your old password to change the new password, allowing the attacker to change the account password as long as they know there is an existing account name.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.2 or higher.

[,2.11.2)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Inserting a filename such as <img src=x onerror=alert(1)> as part of uploaded attachments are not sanitised resulting in execution of JavaScript.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.0-M4 or higher.

[,2.11.0-M4)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Interwiki links with the input such as {{[<script>alert1</script>://test.com]}} are returned and executed as JavaScript when using the HTML preview component.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.0-M4 or higher.

[,2.11.0-M4)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Illegal characters (<...>) of the ReferredPagesPlugin are not properly escaped in the output of the plugin.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.0-M4 or higher.

[,2.11.0-M4)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability due to no escaping being conducted for title and rootnamewithin parameter within ReferredPagesPlugin.java.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.0.M4 or higher.

[,2.11.0.M4)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted InterWiki link could trigger an XSS vulnerability due to lack of output encoding within JSPWikiMarkupParser.java.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.0.M4 or higher.

[,2.11.0.M4)