Description
Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Portals and no updates will be provided for this issue
Remediation
References
http://www.openwall.com/lists/oss-security/2022/07/06/1
https://lists.apache.org/thread/d3g248pr03x8rvmh8p2t3xdlw0wn5dz2
https://www.openwall.com/lists/oss-security/2022/07/06/1
Related Vulnerabilities
CVE-2019-12041 Vulnerability in maven package org.webjars.npm:remarkable
CVE-2023-34616 Vulnerability in maven package com.progsbase.libraries:json
CVE-2020-36732 Vulnerability in maven package org.webjars.bowergithub.brix:crypto-js
CVE-2020-2137 Vulnerability in maven package org.jenkins-ci.plugins:timestamper
CVE-2021-23358 Vulnerability in maven package org.webjars.bowergithub.jashkenas:underscore