Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
CPE | Name | Operator | Version |
---|---|---|---|
org.apache.isis.core:isis-core | lt | 2.0.0-M9 |
www.openwall.com/lists/oss-security/2022/10/19/2
github.com/advisories/GHSA-7pfc-cc9x-8p4m
github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743
github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd
github.com/apache/isis/commit/342255124635013194f63c41a7639f979b3340e8
github.com/apache/isis/commit/a44d53f24a60bcbcbf3919d1b251d5d1e96ba3c2
github.com/apache/isis/commit/c6e9b392de073d1050b56d8209b7c3079d58c600
github.com/apache/isis/commit/cc94a9965a82ba8faac1b151777c44061b178673
issues.apache.org/jira/browse/ISIS-3240
lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz
nvd.nist.gov/vuln/detail/CVE-2022-42466