Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-12407


On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.


Published

2019-09-23T16:15:14.977

Last Modified

2024-11-21T04:22:46.677

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache jspwiki ≤ 2.10.5 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes
Application apache jspwiki 2.11.0 Yes

References