GHSA-3qp6-m7hp-jrwf

Suggest an improvement
Source
https://github.com/advisories/GHSA-3qp6-m7hp-jrwf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-3qp6-m7hp-jrwf/GHSA-3qp6-m7hp-jrwf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3qp6-m7hp-jrwf
Aliases
  • CVE-2021-36739
Published
2022-01-08T00:46:21Z
Modified
2023-11-08T04:06:15.810011Z
Summary
Cross-site Scripting in Apache Pluto
Details

The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.

References

Affected packages

Maven / org.apache.portals.pluto:pluto-portal

Package

Name
org.apache.portals.pluto:pluto-portal
View open source insights on deps.dev
Purl
pkg:maven/org.apache.portals.pluto/pluto-portal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.1

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.1.0-M1
2.1.0-M2
2.1.0-M3

3.*

3.0.0
3.0.1
3.1.0