Apache Software Foundation Apache Portals vulnerabilities
4 known vulnerabilities affecting apache_software_foundation/apache_portals.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2022-32533CRITICALCVSS 9.8vJetspeed 2.3.12022-07-06
CVE-2022-32533 [CRITICAL] CWE-79 CVE-2022-32533: Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number o
Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Portals and no updates will be provided for this issue
cvelistv5nvd
CVE-2021-36739MEDIUMCVSS 6.1vorg.apache.portals.pluto.archetype:mvcbean-jsp-portlet-archetype 3.1.02022-01-06
CVE-2021-36739 [MEDIUM] CWE-79 CVE-2021-36739: The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetyp
The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
cvelistv5nvd
CVE-2021-36737MEDIUMCVSS 6.1vorg.apache.portals.pluto:PortletV3Demo 3.0.0vorg.apache.portals.pluto:PortletV3Demo 3.0.1+1 more2022-01-06
CVE-2021-36737 [MEDIUM] CWE-79 CVE-2021-36737: The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) att
The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact
cvelistv5nvd
CVE-2021-36738MEDIUMCVSS 6.1vorg.apache.portals.pluto.demo:applicant-mvcbean-cdi-jsp-portlet 3.1.02022-01-06
CVE-2021-36738 [MEDIUM] CWE-79 CVE-2021-36738: The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
cvelistv5nvd