Description
It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
Remediation
References
http://syncope.apache.org/security
Related Vulnerabilities
CVE-2019-17554 Vulnerability in maven package org.apache.olingo:odata-server-api
CVE-2017-2612 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2018-1000142 Vulnerability in maven package org.jenkins-ci.plugins:ghprb
CVE-2022-43766 Vulnerability in maven package org.apache.iotdb:iotdb-server
CVE-2019-8331 Vulnerability in maven package org.webjars.bower:bootstrap