org.apache.jspwiki:jspwiki-main@2.11.0.M6 vulnerabilities

  • latest version

    2.12.2

  • first published

    6 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.jspwiki:jspwiki-main package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to insufficient sanitization when the jspwiki.translatorReader.allowHTML property is disabled. An attacker can inject scripts as markdown in header link names to exploit this vulnerability.

    How to fix Cross-site Scripting (XSS)?

    A fix was pushed into the master branch but not yet published.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization. A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.jspwiki:jspwiki-main to version 2.12.0 or higher.

    [,2.12.0)
    • M
    Cross-site Scripting (XSS)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the execute() function in WeblogPlugin.java.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.3 or higher.

    [,2.11.3)
    • M
    Cross-site Scripting (XSS)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Denounce class, which does not limit scripts from being executed by requests against AJAXPreview.jsp.

    NOTE: This vulnerability exists due to an incomplete fix for CVE-2021-40369.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.3 or higher.

    [,2.11.3)
    • M
    Cross-site Scripting (XSS)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the translate() function in XHtmlElementToWikiTranslator.java, which does not limit scripts from being executed by requests against XHRHtml2Markup.jsp.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.3 or higher.

    [,2.11.3)
    • M
    Cross-site Scripting (XSS)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via a carefully crafted user preferences URL for submission, related to the user preferences screen.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.2 or higher.

    [,2.11.2)
    • M
    Cross-site Request Forgery (CSRF)

    org.apache.jspwiki:jspwiki-main is a main release jar for Apache JSPWiki engine.

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the UserProfile.jsp component, which does not require you to type in your old password to change the new password, allowing the attacker to change the account password as long as they know there is an existing account name.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade org.apache.jspwiki:jspwiki-main to version 2.11.2 or higher.

    [,2.11.2)