Description
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0700 | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. |
Github GHSA |
GHSA-g6ww-2x43-h963 | Cross-site scripting in Apache JSPWiki |
References
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10090 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T22:10:09.441Z
Reserved: 2019-03-26T00:00:00.000Z
Link: CVE-2019-10090
No data.
Status : Modified
Published: 2019-09-23T16:15:14.647
Modified: 2024-11-21T04:18:23.003
Link: CVE-2019-10090
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA