| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <7624BC90-8D4E-4D33-8115-D33FF4E28EFF@apache.org> Date: Sat, 19 Apr 2014 14:02:48 +1000 From: Brett Porter <brett@...che.org> To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com Cc: "security@...che.org Team" <security@...che.org> Subject: [SECURITY] CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability CVE-2013-2187: Apache Archiva Cross-Site Scripting vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: - Archiva 1.3 to Continuum 1.3.6 - The unsupported versions Archiva 1.2 to 1.2.2 are also affected. Description: A request that included a specially crafted request parameter could be used to inject arbitrary HTML or Javascript into the Archiva home page. Mitigation: All users are recommended to upgrade to Archiva 2.0.1 or Archiva 1.3.8, which are not affected by this issue. Archiva 2.0.0 and later is not affected by this issue. References: http://archiva.apache.org/security.html
Powered by blists - more mailing lists