CVE-2022-42466
19.10.2022, 08:15
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
Vendor | Product | Version |
---|---|---|
apache | isis | 𝑥 < 2.0.0 |
apache | isis | 2.0.0:milestone1 |
apache | isis | 2.0.0:milestone2 |
apache | isis | 2.0.0:milestone3 |
apache | isis | 2.0.0:milestone4 |
apache | isis | 2.0.0:milestone5 |
apache | isis | 2.0.0:milestone6 |
apache | isis | 2.0.0:milestone7 |
apache | isis | 2.0.0:milestone8 |
𝑥
= Vulnerable software versions