Description
Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Portals and no updates will be provided for this issue
Remediation
References
http://www.openwall.com/lists/oss-security/2022/07/06/1
https://lists.apache.org/thread/d3g248pr03x8rvmh8p2t3xdlw0wn5dz2
https://www.openwall.com/lists/oss-security/2022/07/06/1
Related Vulnerabilities
CVE-2013-4590 Vulnerability in maven package org.apache.tomcat:catalina
CVE-2020-28447 Vulnerability in npm package xopen
CVE-2022-36437 Vulnerability in maven package com.hazelcast.jet:hazelcast-jet-enterprise
CVE-2022-41704 Vulnerability in maven package org.apache.xmlgraphics:batik-bridge
CVE-2023-45648 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core