faces/context/PartialViewContextImpl.java in Eclipse Mojarra, as used in Mojarra for Eclipse EE4J before 2.3.10 and Mojarra JavaServer Faces before 2.2.20, allows Reflected XSS because a client window field is mishandled.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=548244 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://github.com/eclipse-ee4j/mojarra/commit/8f70f2bd024f00ecd5b3dcca45df73edda29dcee - Patch, Third Party Advisory | |
References | () https://github.com/eclipse-ee4j/mojarra/commit/a3fa9573789ed5e867c43ea38374f4dbd5a8f81f - Patch, Third Party Advisory | |
References | () https://github.com/eclipse-ee4j/mojarra/compare/2.3.9-RELEASE...2.3.10-RELEASE - Release Notes, Third Party Advisory | |
References | () https://github.com/eclipse-ee4j/mojarra/files/3039198/advisory.txt - Exploit, Third Party Advisory | |
References | () https://github.com/eclipse-ee4j/mojarra/issues/4556 - Third Party Advisory | |
References | () https://github.com/eclipse-ee4j/mojarra/pull/4567 - Patch, Third Party Advisory | |
References | () https://github.com/javaserverfaces/mojarra/commit/ae1c234d0a6750822ac69d4ae26d90e3571f27fe - Patch, Third Party Advisory | |
References | () https://github.com/javaserverfaces/mojarra/commit/f61935cd39f34329fbf27b1972a506fbdd0ab4d4 - Patch, Third Party Advisory | |
References | () https://github.com/javaserverfaces/mojarra/compare/2.2.19...2.2.20 - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory |
Information
Published : 2019-10-02 14:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17091
Mitre link : CVE-2019-17091
CVE.ORG link : CVE-2019-17091
JSON object : View
Products Affected
oracle
- healthcare_data_repository
- retail_financial_integration
- secure_global_desktop
- rapid_planning
- mojarra_javaserver_faces
- application_testing_suite
- primavera_p6_enterprise_project_portfolio_management
- banking_enterprise_product_manufacturing
- communications_network_integrity
- retail_bulk_data_integration
- retail_store_inventory_management
- retail_service_backbone
- retail_invoice_matching
- time_and_labor
- retail_assortment_planning
- health_sciences_information_manager
- retail_integration_bus
- communications_diameter_signaling_router
- retail_advanced_inventory_planning
- retail_merchandising_system
- enterprise_data_quality
- communications_unified_inventory_management
eclipse
- mojarra
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')