CVE-2011-0533

Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta; and Archiva 1.3.0 through 1.3.3 and 1.0 through 1.22 allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to the autoIncludeParameters setting for the extremecomponents table.
References
Link Resource
http://continuum.apache.org/security.html
http://jira.codehaus.org/browse/CONTINUUM-2604
http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E
http://osvdb.org/70925
http://seclists.org/fulldisclosure/2011/Feb/236 Patch
http://secunia.com/advisories/43261 Vendor Advisory
http://secunia.com/advisories/43334 Vendor Advisory
http://securityreason.com/securityalert/8091
http://securitytracker.com/id?1025065
http://svn.apache.org/viewvc?view=revision&revision=1066053 Patch
http://svn.apache.org/viewvc?view=revision&revision=1066056 Patch
http://www.securityfocus.com/archive/1/516342/100/0/threaded
http://www.securityfocus.com/archive/1/516474/100/0/threaded
http://www.securityfocus.com/bid/46311
http://www.vupen.com/english/advisories/2011/0373 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0426 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/65343
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581
http://continuum.apache.org/security.html
http://jira.codehaus.org/browse/CONTINUUM-2604
http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E
http://osvdb.org/70925
http://seclists.org/fulldisclosure/2011/Feb/236 Patch
http://secunia.com/advisories/43261 Vendor Advisory
http://secunia.com/advisories/43334 Vendor Advisory
http://securityreason.com/securityalert/8091
http://securitytracker.com/id?1025065
http://svn.apache.org/viewvc?view=revision&revision=1066053 Patch
http://svn.apache.org/viewvc?view=revision&revision=1066056 Patch
http://www.securityfocus.com/archive/1/516342/100/0/threaded
http://www.securityfocus.com/archive/1/516474/100/0/threaded
http://www.securityfocus.com/bid/46311
http://www.vupen.com/english/advisories/2011/0373 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0426 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/65343
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:continuum:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:continuum:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:continuum:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:continuum:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:continuum:1.2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:continuum:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:continuum:1.4.0:beta:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:archiva:1.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:24

Type Values Removed Values Added
References () http://continuum.apache.org/security.html - () http://continuum.apache.org/security.html -
References () http://jira.codehaus.org/browse/CONTINUUM-2604 - () http://jira.codehaus.org/browse/CONTINUUM-2604 -
References () http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E - () http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E -
References () http://osvdb.org/70925 - () http://osvdb.org/70925 -
References () http://seclists.org/fulldisclosure/2011/Feb/236 - Patch () http://seclists.org/fulldisclosure/2011/Feb/236 - Patch
References () http://secunia.com/advisories/43261 - Vendor Advisory () http://secunia.com/advisories/43261 - Vendor Advisory
References () http://secunia.com/advisories/43334 - Vendor Advisory () http://secunia.com/advisories/43334 - Vendor Advisory
References () http://securityreason.com/securityalert/8091 - () http://securityreason.com/securityalert/8091 -
References () http://securitytracker.com/id?1025065 - () http://securitytracker.com/id?1025065 -
References () http://svn.apache.org/viewvc?view=revision&revision=1066053 - Patch () http://svn.apache.org/viewvc?view=revision&revision=1066053 - Patch
References () http://svn.apache.org/viewvc?view=revision&revision=1066056 - Patch () http://svn.apache.org/viewvc?view=revision&revision=1066056 - Patch
References () http://www.securityfocus.com/archive/1/516342/100/0/threaded - () http://www.securityfocus.com/archive/1/516342/100/0/threaded -
References () http://www.securityfocus.com/archive/1/516474/100/0/threaded - () http://www.securityfocus.com/archive/1/516474/100/0/threaded -
References () http://www.securityfocus.com/bid/46311 - () http://www.securityfocus.com/bid/46311 -
References () http://www.vupen.com/english/advisories/2011/0373 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0373 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0426 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0426 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65343 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65343 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12581 -

07 Nov 2023, 02:06

Type Values Removed Values Added
References
  • {'url': 'http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360@apache.org%3E', 'name': '[continuum-users] 20110210 [SECURITY] CVE-2011-0533: Apache Continuum cross-site scripting vulnerability', 'tags': ['Vendor Advisory'], 'refsource': 'MLIST'}
  • () http://mail-archives.apache.org/mod_mbox/continuum-users/201102.mbox/%3C981C0A79-5B7B-4053-84CC-3217870BE360%40apache.org%3E -

Information

Published : 2011-02-17 18:00

Updated : 2024-11-21 01:24


NVD link : CVE-2011-0533

Mitre link : CVE-2011-0533

CVE.ORG link : CVE-2011-0533


JSON object : View

Products Affected

apache

  • continuum
  • archiva
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')