CVE-2013-5855

Oracle Mojarra 2.2.x before 2.2.6 and 2.1.x before 2.1.28 does not perform appropriate encoding when a (1) <h:outputText> tag or (2) EL expression is used after a scriptor style block, which allows remote attackers to conduct cross-site scripting (XSS) attacks via application-specific vectors.
References
Link Resource
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Vendor Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65600
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://java.net/jira/browse/JAVASERVERFACES-3150
https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Vendor Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65600
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://java.net/jira/browse/JAVASERVERFACES-3150
https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:mojarra:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.22:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.24:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.1.27:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mojarra:2.2.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:58

Type Values Removed Values Added
References () http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU - () http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU -
References () http://rhn.redhat.com/errata/RHSA-2015-0675.html - () http://rhn.redhat.com/errata/RHSA-2015-0675.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0720.html - () http://rhn.redhat.com/errata/RHSA-2015-0720.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0765.html - () http://rhn.redhat.com/errata/RHSA-2015-0765.html -
References () http://seclists.org/fulldisclosure/2014/Dec/23 - () http://seclists.org/fulldisclosure/2014/Dec/23 -
References () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -
References () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Vendor Advisory () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/534161/100/0/threaded - () http://www.securityfocus.com/archive/1/534161/100/0/threaded -
References () http://www.securityfocus.com/bid/65600 - () http://www.securityfocus.com/bid/65600 -
References () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - () http://www.vmware.com/security/advisories/VMSA-2014-0012.html -
References () https://java.net/jira/browse/JAVASERVERFACES-3150 - () https://java.net/jira/browse/JAVASERVERFACES-3150 -
References () https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258 - () https://java.net/jira/browse/JAVASERVERFACES_SPEC_PUBLIC-1258 -

Information

Published : 2014-07-17 05:10

Updated : 2024-11-21 01:58


NVD link : CVE-2013-5855

Mitre link : CVE-2013-5855

CVE.ORG link : CVE-2013-5855


JSON object : View

Products Affected

oracle

  • mojarra
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')