In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 04:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/107631 - Third Party Advisory, VDB Entry | |
| References | () https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224 - Vendor Advisory | |
| References | () https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16%40%3Ccommits.jspwiki.apache.org%3E - | |
| References | () https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67%40%3Cdev.jspwiki.apache.org%3E - | |
| References | () https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1%40%3Ccommits.jspwiki.apache.org%3E - | 
Information
                Published : 2019-03-28 21:29
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0224
Mitre link : CVE-2019-0224
CVE.ORG link : CVE-2019-0224
JSON object : View
Products Affected
                apache
- jspwiki
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
