|
Message-ID: <CALJOYLFzKmL_qChvRV8iAcQBVuixtXr-_=50mPJynpUE5qSsHA@mail.gmail.com> Date: Wed, 19 Oct 2022 07:02:33 +0100 From: Dan Haywood <danhaywood@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-42466: Apache Isis: XSS vulnerability, eg for String properties. Severity: important Description: Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered. Credit: Apache Isis would like to thank Qing Xu for reporting this issue
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.