Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAMufup4hyhhpgfsiEcmKY7u_vSueB=1WTK5NCShaep-wXP5pOQ@mail.gmail.com>
Date: Thu, 31 Jan 2019 21:32:26 +0100
From: Juan Pablo Santos Rodríguez <juanpablo.santos@...il.com>
To: Henri Salo <henri@...v.fi>
Cc: oss-security@...ts.openwall.com
Subject: Re: [CVE-2018-20242] Apache JSPWiki Cross-site
 scripting vulnerability on Apache JSPWiki

Hi Henri,

the vulnerability announcement can be seen here
https://lists.apache.org/thread.html/8ee4644432c0a433c5c514a57d940cf6dcb0a0094acd97b36290f0b4@%3Cuser.jspwiki.apache.org%3E
We've also documented it at
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2018-20242

Please do let me know if something else is needed.


best regards,
juan pablo

On Thu, Jan 31, 2019 at 9:39 AM Henri Salo <henri@...v.fi> wrote:

> On Wed, Jan 30, 2019 at 09:01:43PM +0100, Juan Pablo Santos Rodríguez
> wrote:
> > Versions Affected: Apache JSPWiki up to 2.10.5
> >
> > Description:
> > A carefully crafted URL could trigger an XSS vulnerability on Apache
> > JSPWiki, which could lead to session hijacking.
> >
> > Mitigation:
> > Apache JSPWiki users should upgrade to 2.11.0.M1 or later.
> >
> > Credit:
> > This issue was discovered by Jamie Parfet.
>
> Do you have any Apache reference URLs for this issue?
>
> --
> Henri Salo
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.