org.apache.jspwiki:jspwiki-war@2.11.0.M3 vulnerabilities
-
latest version
2.12.1
-
latest non vulnerable version
-
first published
10 years ago
-
latest version published
9 months ago
-
licenses detected
- [2.10.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.jspwiki:jspwiki-war package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization. A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.12.0)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in How to fix Cross-site Request Forgery (CSRF)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to not adequately filtering requests against NOTE: This vulnerability can be worked around in versions 2.7.0 and on by requiring manual approval for user management workflows. How to fix Cross-site Request Forgery (CSRF)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the NOTE: This vulnerability exists due to an incomplete fix for CVE-2021-40369. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.3)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Page Revision History, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[2.9.0,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M5)
|
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A carefully crafted malicious attachment could trigger an XSS vulnerability, which could lead to session hijacking. This vulnerability exists due to no escaping occurring in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.11.0.M4)
|