Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1wd3BjLWhxcTItaHgyeM4AATX1

Cross-site Scripting in wicket-jquery-ui

In Wicket jQuery UI 6.28.0 and earlier, 7.9.1 and earlier, and 8.0.0-M8 and earlier, a security issue has been discovered in the WYSIWYG editor that allows an attacker to submit arbitrary JS code to WYSIWYG editor.

Permalink: https://github.com/advisories/GHSA-pwpc-hqq2-hx2x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wd3BjLWhxcTItaHgyeM4AATX1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago


CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS Percentage: 0.00067
EPSS Percentile: 0.30505

Identifiers: GHSA-pwpc-hqq2-hx2x, CVE-2017-15719
References: Repository: https://github.com/sebfz1/wicket-jquery-ui
Blast Radius: 1.0

Affected Packages

maven:com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 8.0.0-M1, < 8.0.0-M8.1, >= 7.0.0, < 7.9.2, < 6.28.1
Fixed in: 8.0.0-M8.1, 7.9.2, 6.28.1
All affected versions: 1.5.10, 1.5.11, 6.7.0, 6.8.0, 6.8.1, 6.9.0, 6.9.1, 6.10.0, 6.11.0, 6.12.0, 6.13.0, 6.13.1, 6.14.0, 6.15.0, 6.16.0, 6.17.0, 6.18.0, 6.18.1, 6.19.0, 6.19.1, 6.19.2, 6.19.3, 6.20.0, 6.20.1, 6.20.2, 6.20.3, 6.21.0, 6.21.1, 6.21.2, 6.22.0, 6.22.1, 6.22.2, 6.23.0, 6.24.0, 6.25.0, 6.25.1, 6.26.0, 6.27.0, 6.28.0, 7.0.0, 7.0.1, 7.0.2, 7.1.0, 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.5.0, 7.6.0, 7.7.0, 7.8.0, 7.9.0, 7.9.1, 8.0.0-M1, 8.0.0-M1.1, 8.0.0-M2, 8.0.0-M3, 8.0.0-M4, 8.0.0-M4.1, 8.0.0-M5, 8.0.0-M6, 8.0.0-M7, 8.0.0-M8
All unaffected versions: 6.28.1, 6.29.0, 6.29.1, 7.9.2, 7.10.0, 7.10.1, 7.10.2, 7.17.0, 7.18.0, 8.0.0, 8.1.0, 8.3.0, 8.6.0, 8.8.0, 8.9.0, 8.10.0, 8.10.1, 8.10.2, 8.11.0, 8.11.1, 8.12.0, 8.13.0, 8.14.0, 9.0.0, 9.1.0, 9.2.0, 9.2.1, 9.3.0, 9.3.1, 9.3.2, 9.5.0, 9.6.0, 9.7.0, 9.8.0, 9.8.1, 9.11.0, 9.12.0, 9.18.0