org.apache.jspwiki:jspwiki-war@2.10.2 vulnerabilities
-
latest version
2.12.2
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
6 months ago
-
licenses detected
- [2.10.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.jspwiki:jspwiki-war package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the upload page. An attacker can execute arbitrary JavaScript code in the context of the victim's browser session and potentially access sensitive information by injecting malicious scripts into the page. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.12.2)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization. A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.12.0)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in How to fix Cross-site Request Forgery (CSRF)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to not adequately filtering requests against NOTE: This vulnerability can be worked around in versions 2.7.0 and on by requiring manual approval for user management workflows. How to fix Cross-site Request Forgery (CSRF)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the NOTE: This vulnerability exists due to an incomplete fix for CVE-2021-40369. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Page Revision History, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[2.9.0,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted malicious attachment could trigger an XSS vulnerability, which could lead to session hijacking. This vulnerability exists due to no escaping occurring in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M4)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted URL could trigger it and lead to session hijacking. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M1)
|