Description
The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.
Remediation
References
https://lists.apache.org/thread.html/c4b0d83a534d6cdf2de54dbbd00e3538072ac2e360781b784608ed0d%40%3Cdev.tomee.apache.org%3E
Related Vulnerabilities
CVE-2021-32809 Vulnerability in maven package org.webjars.bowergithub.ckeditor:ckeditor4
CVE-2019-10403 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-40815 Vulnerability in maven package org.opencrx:opencrx-core-models
CVE-2022-32065 Vulnerability in maven package com.ruoyi:ruoyi
CVE-2019-13235 Vulnerability in maven package org.opencms:opencms-core