CWE-Bench-Java / advisory /apache__jspwiki_CVE-2019-10089_2.11.0.M4.json
claire71's picture
add advisory .json files
f091478 verified
raw
history blame
1.61 kB
{
"schema_version": "1.4.0",
"id": "GHSA-3rx2-x6mx-grj3",
"modified": "2021-08-17T22:35:54Z",
"published": "2019-10-11T18:41:54Z",
"aliases": [
"CVE-2019-10089"
],
"summary": "Cross-site scripting in Apache JSPWiki",
"details": "On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.jspwiki:jspwiki-war"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.9.0"
},
{
"fixed": "2.11.0.M5"
}
]
}
],
"database_specific": {
"last_known_affected_version_range": "<= 2.11.0.M4"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10089"
},
{
"type": "WEB",
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2019-09-25T12:33:32Z",
"nvd_published_at": "2019-09-23T15:15:00Z"
}
}