GHSA-3qp6-m7hp-jrwf

Suggest an improvement
Source
https://github.com/advisories/GHSA-3qp6-m7hp-jrwf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-3qp6-m7hp-jrwf/GHSA-3qp6-m7hp-jrwf.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3qp6-m7hp-jrwf
Aliases
  • CVE-2021-36739
Published
2022-01-08T00:46:21Z
Modified
2024-12-04T05:29:04.634558Z
Summary
Cross-site Scripting in Apache Pluto
Details

The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.

Database specific
{
    "nvd_published_at": "2022-01-06T09:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-01-07T23:39:42Z"
}
References

Affected packages

Maven / org.apache.portals.pluto:pluto-portal

Package

Name
org.apache.portals.pluto:pluto-portal
View open source insights on deps.dev
Purl
pkg:maven/org.apache.portals.pluto/pluto-portal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.1

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.1.0-M1
2.1.0-M2
2.1.0-M3

3.*

3.0.0
3.0.1
3.1.0