Description
Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Portals and no updates will be provided for this issue
Remediation
References
http://www.openwall.com/lists/oss-security/2022/07/06/1
https://lists.apache.org/thread/d3g248pr03x8rvmh8p2t3xdlw0wn5dz2
https://www.openwall.com/lists/oss-security/2022/07/06/1
Related Vulnerabilities
CVE-2019-10468 Vulnerability in maven package com.elasticbox.jenkins-ci.plugins:kubernetes-ci
CVE-2020-15262 Vulnerability in npm package webpack-subresource-integrity
CVE-2020-2246 Vulnerability in maven package org.jenkins-ci.plugins:valgrind
CVE-2022-23059 Vulnerability in maven package com.shopizer:sm-shop-model
CVE-2023-3691 Vulnerability in maven package org.webjars.npm:layui