Описание
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.0 (исключая)
Одно из
cpe:2.3:a:apache:isis:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone3:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone4:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone5:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone6:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone7:*:*:*:*:*:*
cpe:2.3:a:apache:isis:2.0.0:milestone8:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.2198
Средний
6.1 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
EPSS
Процентиль: 96%
0.2198
Средний
6.1 Medium
CVSS3
Дефекты
CWE-79
CWE-79