Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-24891
HistoryApr 27, 2022 - 12:00 a.m.

CVE-2022-24891

2022-04-2700:00:00
ubuntu.com
ubuntu.com
16

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.2%

ESAPI (The OWASP Enterprise Security API) is a free, open source, web
application security control library. Prior to version 2.3.0.0, there is a
potential for a cross-site scripting vulnerability in ESAPI caused by a
incorrect regular expression for “onsiteURL” in the antisamy-esapi.xml
configuration file that can cause “javascript:” URLs to fail to be
correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a
workaround, manually edit the antisamy-esapi.xml configuration files to
change the “onsiteURL” regular expression. More information about
remediation of the vulnerability, including the workaround, is available in
the maintainers’ release notes and security bulletin.

Bugs

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.2%