CVE-2022-42466: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
(updated )
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
References
- www.openwall.com/lists/oss-security/2022/10/19/2
- github.com/advisories/GHSA-7pfc-cc9x-8p4m
- github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743
- github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd
- github.com/apache/isis/commit/342255124635013194f63c41a7639f979b3340e8
- github.com/apache/isis/commit/a44d53f24a60bcbcbf3919d1b251d5d1e96ba3c2
- github.com/apache/isis/commit/c6e9b392de073d1050b56d8209b7c3079d58c600
- github.com/apache/isis/commit/cc94a9965a82ba8faac1b151777c44061b178673
- issues.apache.org/jira/browse/ISIS-3240
- lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz
- nvd.nist.gov/vuln/detail/CVE-2022-42466
Detect and mitigate CVE-2022-42466 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →