A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468.
References
Link | Resource |
---|---|
https://github.com/siwapp/siwapp-ror/pull/365 | Not Applicable |
https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c174 | Patch Third Party Advisory |
https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81 | Release Notes Third Party Advisory |
https://vuldb.com/?id.216468 | Third Party Advisory VDB Entry |
Configurations
History
28 Dec 2022, 18:50
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c174 - Patch, Third Party Advisory | |
References | (N/A) https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81 - Release Notes, Third Party Advisory | |
References | (N/A) https://github.com/siwapp/siwapp-ror/pull/365 - Not Applicable | |
References | (N/A) https://vuldb.com/?id.216468 - Third Party Advisory, VDB Entry | |
CWE | CWE-74 |
|
First Time |
Hitachi community Plugin Framework
Hitachi |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CPE | cpe:2.3:a:hitachi:community_plugin_framework:*:*:*:*:*:*:*:* |
21 Dec 2022, 19:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-21 19:15
Updated : 2023-12-10 14:48
NVD link : CVE-2021-4266
Mitre link : CVE-2021-4266
CVE.ORG link : CVE-2021-4266
JSON object : View
Products Affected
hitachi
- community_plugin_framework