<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
[CVE-2019-0224] Apache JSPWiki Cross-site scripting vulnerability
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Juan Pablo Santos Rodríguez <juanpablo.santos () gmail com>
Date: Tue, 26 Mar 2019 22:41:29 +0100
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
[CVEID]:CVE-2019-0224
[PRODUCT]:Apache JSPWiki
[VERSION]:Apache JSPWiki 2.9.0 to 2.11.0.M2
[PROBLEMTYPE]:Cross-site scripting vulnerability
[REFERENCES]:https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224
[DESCRIPTION]: A carefully crafted URL could execute javascript on another
user's session. No information could be saved on the server or jspwiki
database, nor would an attacker be able to execute js on someone else's
browser; only on it's own browser.
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
[CVE-2019-0224] Apache JSPWiki Cross-site scripting vulnerability Juan Pablo Santos Rodríguez (Mar 26)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->