Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03cGZjLWNjOXgtOHA0bc4AAvbZ
Apache Isis Cross-site Scripting vulnerability
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Permalink: https://github.com/advisories/GHSA-7pfc-cc9x-8p4mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03cGZjLWNjOXgtOHA0bc4AAvbZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: almost 2 years ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00205
EPSS Percentile: 0.58627
Identifiers: GHSA-7pfc-cc9x-8p4m, CVE-2022-42466
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-42466
- https://lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz
- https://github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743
- https://github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd
- https://github.com/apache/isis/commit/342255124635013194f63c41a7639f979b3340e8
- https://github.com/apache/isis/commit/a44d53f24a60bcbcbf3919d1b251d5d1e96ba3c2
- https://github.com/apache/isis/commit/c6e9b392de073d1050b56d8209b7c3079d58c600
- https://github.com/apache/isis/commit/cc94a9965a82ba8faac1b151777c44061b178673
- https://issues.apache.org/jira/browse/ISIS-3240
- http://www.openwall.com/lists/oss-security/2022/10/19/2
- https://github.com/advisories/GHSA-7pfc-cc9x-8p4m
Blast Radius: 5.5
Affected Packages
maven:org.apache.isis.core:isis-core
Dependent packages: 2Dependent repositories: 8
Downloads:
Affected Version Ranges: < 2.0.0-M9
Fixed in: 2.0.0-M9
All affected versions: 2.0.0-M4, 2.0.0-M5, 2.0.0-M6, 2.0.0-M7, 2.0.0-M8
All unaffected versions: