Описание
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
Отчет
velocity as shipped in Red Hat Enterprise Linux 6, 7, and 8, as well as CodeReady Studio 12, is not affected by this flaw as the affected velocity-tools code is not present in shipped products. This includes those shipped in javapackages-tools and pki-deps as well.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| A-MQ Clients 2 | velocity | Not affected | ||
| Red Hat BPM Suite 6 | velocity | Out of support scope | ||
| Red Hat CodeReady Studio 12 | velocity | Not affected | ||
| Red Hat Decision Manager 7 | velocity | Not affected | ||
| Red Hat Enterprise Linux 6 | velocity | Not affected | ||
| Red Hat Enterprise Linux 7 | velocity | Not affected | ||
| Red Hat Enterprise Linux 8 | javapackages-tools:201801/velocity | Not affected | ||
| Red Hat Enterprise Linux 8 | pki-deps:10.6/velocity | Not affected | ||
| Red Hat Enterprise Linux 9 | velocity | Not affected | ||
| Red Hat Fuse 7 | velocity | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
The default error page for VelocityView in Apache Velocity Tools prior ...
Cross-site scripting (XSS) in Apache Velocity Tools
EPSS
6.5 Medium
CVSS3