Описание
Apache Isis Cross-site Scripting vulnerability
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-42466
- https://github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743
- https://github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd
- https://github.com/apache/isis/commit/342255124635013194f63c41a7639f979b3340e8
- https://github.com/apache/isis/commit/a44d53f24a60bcbcbf3919d1b251d5d1e96ba3c2
- https://github.com/apache/isis/commit/c6e9b392de073d1050b56d8209b7c3079d58c600
- https://github.com/apache/isis/commit/cc94a9965a82ba8faac1b151777c44061b178673
- https://issues.apache.org/jira/browse/ISIS-3240
- https://lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz
- http://www.openwall.com/lists/oss-security/2022/10/19/2
Пакеты
org.apache.isis.core:isis-core
< 2.0.0-M9
2.0.0-M9
Связанные уязвимости
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.