org.apache.jspwiki:jspwiki-war@2.11.0.M8 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.jspwiki:jspwiki-war package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the upload page. An attacker can execute arbitrary JavaScript code in the context of the victim's browser session and potentially access sensitive information by injecting malicious scripts into the page.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.12.2 or higher.

[,2.12.2)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization. A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.12.0 or higher.

[,2.12.0)
  • C
Cross-site Request Forgery (CSRF)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in CsrfProtectionFilter.java due to not adequately filtering requests against DeleteGroup.jsp, EditGroup.jsp, and NewGroup.jsp. This allows an attacker to modify an account email address and reset its password, or escalate to group privileges from a user account.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • C
Cross-site Request Forgery (CSRF)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to not adequately filtering requests against UserPreferences.jsp. This allows an attacker to modify an account email address and reset its password, thereby taking over the account.

NOTE: This vulnerability can be worked around in versions 2.7.0 and on by requiring manual approval for user management workflows.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Denounce class, which does not limit scripts from being executed by requests against AJAXPreview.jsp.

NOTE: This vulnerability exists due to an incomplete fix for CVE-2021-40369.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)
  • M
Cross-site Scripting (XSS)

org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the translate() function in XHtmlElementToWikiTranslator.java, which does not limit scripts from being executed by requests against XHRHtml2Markup.jsp.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.jspwiki:jspwiki-war to version 2.11.3 or higher.

[,2.11.3)