Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz | mailing list vendor advisory |
http://www.openwall.com/lists/oss-security/2022/10/19/2 | third party advisory mailing list |