GHSA-x588-g38j-f672

Suggest an improvement
Source
https://github.com/advisories/GHSA-x588-g38j-f672
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-x588-g38j-f672/GHSA-x588-g38j-f672.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-x588-g38j-f672
Aliases
  • CVE-2021-36737
Published
2022-01-08T00:46:20Z
Modified
2024-12-04T05:33:20.793625Z
Summary
Cross-site Scripting in Apache Pluto
Details

The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact

Database specific
{
    "nvd_published_at": "2022-01-06T09:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-01-07T23:37:32Z"
}
References

Affected packages

Maven / org.apache.portals.pluto:pluto-portal

Package

Name
org.apache.portals.pluto:pluto-portal
View open source insights on deps.dev
Purl
pkg:maven/org.apache.portals.pluto/pluto-portal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.1

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.1.0-M1
2.1.0-M2
2.1.0-M3

3.*

3.0.0
3.0.1
3.1.0