Description
It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
Remediation
References
http://syncope.apache.org/security
Related Vulnerabilities
CVE-2022-23082 Vulnerability in maven package io.whitesource:curekit
CVE-2019-10425 Vulnerability in maven package org.jvnet.hudson.plugins:gcal
CVE-2020-1960 Vulnerability in maven package org.apache.flink:flink-metrics-core
CVE-2020-27216 Vulnerability in maven package org.mortbay.jetty:jetty
CVE-2020-9492 Vulnerability in maven package org.apache.hadoop:hadoop-hdfs-client