JAMWiki 'message' Parameter Cross Site Scripting Vulnerability

Summary
This host is running JAMWiki and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site. Impact Level: Application
Solution
Upgrade to JAMWiki version 0.8.4 or later. For updates refer to http://jamwiki.org/wiki/en/JAMWiki
Insight
The flaw is caused by improper validation of user-supplied input to the 'message' parameter via Special:Login in error.jsp, which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Affected
JAMWiki versions prior to 0.8.4
References