org.apache.jspwiki:jspwiki-war@2.10.5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.jspwiki:jspwiki-war package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization. A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.12.0 or higher.

[,2.12.0)
  • C
Cross-site Request Forgery (CSRF)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in CsrfProtectionFilter.java due to not adequately filtering requests against DeleteGroup.jsp, EditGroup.jsp, and NewGroup.jsp. This allows an attacker to modify an account email address and reset its password, or escalate to group privileges from a user account.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • C
Cross-site Request Forgery (CSRF)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to not adequately filtering requests against UserPreferences.jsp. This allows an attacker to modify an account email address and reset its password, thereby taking over the account.

NOTE: This vulnerability can be worked around in versions 2.7.0 and on by requiring manual approval for user management workflows.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Denounce class, which does not limit scripts from being executed by requests against AJAXPreview.jsp.

NOTE: This vulnerability exists due to an incomplete fix for CVE-2021-40369.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the translate() function in XHtmlElementToWikiTranslator.java, which does not limit scripts from being executed by requests against XHRHtml2Markup.jsp.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Page Revision History, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M5 or higher.

[2.9.0,2.11.0.M5)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M5 or higher.

[,2.11.0.M5)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M5 or higher.

[,2.11.0.M5)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M5 or higher.

[,2.11.0.M5)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to InfoContent.jsp, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M5 or higher.

[,2.11.0.M5)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted malicious attachment could trigger an XSS vulnerability, which could lead to session hijacking. This vulnerability exists due to no escaping occurring in the att.fileName field within multiple areas of the package.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M4 or higher.

[,2.11.0.M4)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted URL could trigger it and lead to session hijacking.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.0.M1 or higher.

[,2.11.0.M1)