Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190131083943.lnx3lwhhu3h5suxh@tunkki.bugs.fi>
Date: Thu, 31 Jan 2019 10:39:43 +0200
From: Henri Salo <henri@...v.fi>
To: Juan Pablo Santos Rodríguez <juanpablo@...che.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: [CVE-2018-20242] Apache JSPWiki Cross-site
 scripting vulnerability on Apache JSPWiki

On Wed, Jan 30, 2019 at 09:01:43PM +0100, Juan Pablo Santos Rodríguez wrote:
> Versions Affected: Apache JSPWiki up to 2.10.5
> 
> Description:
> A carefully crafted URL could trigger an XSS vulnerability on Apache
> JSPWiki, which could lead to session hijacking.
> 
> Mitigation:
> Apache JSPWiki users should upgrade to 2.11.0.M1 or later.
> 
> Credit:
> This issue was discovered by Jamie Parfet.

Do you have any Apache reference URLs for this issue?

-- 
Henri Salo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.