GHSA-jg6j-jrxv-2hh9

Suggest an improvement
Source
https://github.com/advisories/GHSA-jg6j-jrxv-2hh9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-jg6j-jrxv-2hh9/GHSA-jg6j-jrxv-2hh9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jg6j-jrxv-2hh9
Aliases
  • CVE-2021-36738
Published
2022-01-08T00:46:17Z
Modified
2024-12-04T05:40:30.611777Z
Summary
Cross-site Scripting in Apache Pluto
Details

The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact

Database specific
{
    "nvd_published_at": "2022-01-06T09:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-01-07T23:38:31Z"
}
References

Affected packages

Maven / org.apache.portals.pluto:pluto-portal

Package

Name
org.apache.portals.pluto:pluto-portal
View open source insights on deps.dev
Purl
pkg:maven/org.apache.portals.pluto/pluto-portal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.1

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.1.0-M1
2.1.0-M2
2.1.0-M3

3.*

3.0.0
3.0.1
3.1.0