CVE-2022-24891

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24891
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24891.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24891
Aliases
Downstream
Published
2022-04-27T00:00:00Z
Modified
2025-10-22T18:29:33.729814Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Cross-site Scripting in org.owasp.esapi:esapi -- antisamy-esapi.xml configuration file
Details

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the antisamy-esapi.xml configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the antisamy-esapi.xml configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/esapi/esapi-java-legacy

Affected ranges

Type
GIT
Repo
https://github.com/esapi/esapi-java-legacy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

esapi-2.*

esapi-2.1.0.1
esapi-2.2.0.0
esapi-2.2.0.0-RC1
esapi-2.2.0.0-RC2
esapi-2.2.0.0-RC3
esapi-2.2.1.0
esapi-2.2.1.0-RC1
esapi-2.2.1.1
esapi-2.2.2.0
esapi-2.2.3.0