Show plain JSON{"containers": {"cna": {"affected": [{"product": "Apache JSPWiki", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "Apache JSPWiki up to 2.11.2", "status": "affected", "version": "Apache JSPWiki", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "This issue was discovered by Wang Ran, from JDArmy, @jd.com "}], "descriptions": [{"lang": "en", "value": "A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later."}], "metrics": [{"other": {"content": {"other": "moderate"}, "type": "unknown"}}], "problemTypes": [{"descriptions": [{"description": "XSS", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-08-04T06:15:57", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732"}], "source": {"discovery": "UNKNOWN"}, "title": "Apache JSPWiki Cross-site scripting vulnerability on WeblogPlugin", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@apache.org", "ID": "CVE-2022-28732", "STATE": "PUBLIC", "TITLE": "Apache JSPWiki Cross-site scripting vulnerability on WeblogPlugin"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Apache JSPWiki", "version": {"version_data": [{"version_affected": "<=", "version_name": "Apache JSPWiki", "version_value": "Apache JSPWiki up to 2.11.2"}]}}]}, "vendor_name": "Apache Software Foundation"}]}}, "credit": [{"lang": "eng", "value": "This issue was discovered by Wang Ran, from JDArmy, @jd.com "}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": [{"other": "moderate"}], "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "XSS"}]}]}, "references": {"reference_data": [{"name": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732", "refsource": "MISC", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732"}]}, "source": {"discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T06:03:52.589Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732"}]}]}, "cveMetadata": {"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-28732", "datePublished": "2022-08-04T06:15:57", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-08-03T06:03:52.589Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}