Description
In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site scripting where one authenticated user can cause scripts to run in the browser of another user authorized to access the first user's resources. This is due to improper escaping of server-side content. There is known to be a proof-of-concept exploit using this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4267 | In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site scripting where one authenticated user can cause scripts to run in the browser of another user authorized to access the first user's resources. This is due to improper escaping of server-side content. There is known to be a proof-of-concept exploit using this vulnerability. |
Github GHSA |
GHSA-j3g9-3fvv-gqfp | Cross-site Scripting In Apache Brooklyn |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T18:54:35.712Z
Reserved: 2016-12-05T00:00:00.000Z
Link: CVE-2017-3165
No data.
Status : Modified
Published: 2017-09-13T16:29:00.540
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-3165
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA