Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://struts.apache.org/2.2.3/docs/version-notes-223.html - | |
References | () http://www.vupen.com/english/advisories/2011/1198 - Vendor Advisory | |
References | () https://issues.apache.org/jira/browse/WW-3597 - Exploit | |
References | () https://issues.apache.org/jira/browse/WW-3608 - |
Information
Published : 2011-05-13 17:05
Updated : 2024-11-21 01:27
NVD link : CVE-2011-2087
Mitre link : CVE-2011-2087
CVE.ORG link : CVE-2011-2087
JSON object : View
Products Affected
apache
- struts
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')