6.1
CVSSv3

CVE-2022-24891

Published: 27/04/2022 Updated: 23/06/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

owasp enterprise security api

oracle weblogic server 12.2.1.3.0

oracle weblogic server 12.2.1.4.0

oracle weblogic server 14.1.1.0.0

netapp oncommand workflow automation -

netapp active iq unified manager -

Vendor Advisories

Debian Bug report logs - #1010339 libowasp-esapi-java: CVE-2022-24891 CVE-2022-23457 - cross-site-scripting and control-flow bypass Package: src:libowasp-esapi-java; Maintainer for src:libowasp-esapi-java is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Neil Williams <codehelp@debian ...

Github Repositories

enum_cvss This Python script reads a list of components from a file, line by line and then uses the BD API to determine if that component has any vulnerabilities If it does, it enumerates additional information including the CVSS 2 and CVSS 3 scores (the main reason FM wants the script) I used the same centralized logging facility for both error handling and saving the output