Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
2022-10-19T08:15:11.340
2025-05-08T20:15:22.127
Modified
CVSSv3.1: 6.1 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | isis | < 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |
Application | apache | isis | 2.0.0 | Yes |