We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-25090

Apache Roller: Insufficient input validation for some user profile and bookmark fields when Roller in untested-users mode



Assignerapache
Reserved2024-02-04
Published2024-07-26
Updated2024-09-13

Description

Insufficient input validation and sanitation in Profile name & screenname, Bookmark name & description and blogroll name features in all versions of Apache Roller on all platforms allows an authenticated user to perform an XSS attack. Mitigation: if you do not have Roller configured for untrusted users, then you need to do nothing because you trust your users to author raw HTML and other web content. If you are running with untrusted users then you should upgrade to Roller 6.1.3. This issue affects Apache Roller: from 5.0.0 before 6.1.3. Users are recommended to upgrade to version 6.1.3, which fixes the issue.

Problem types

CWE-20 Improper Input Validation

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

5.0.0 before 6.1.3
affected

Credits

Jacob Hazak 0x4005a886a0

References

https://lists.apache.org/thread/lb50jqyxwf8jrfpydl6dc5zpqtpgrrwd vendor-advisory

cve.org CVE-2024-25090

nvd.nist.gov CVE-2024-25090

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.