Description
Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Portals and no updates will be provided for this issue
Remediation
References
https://www.openwall.com/lists/oss-security/2022/07/06/1
https://lists.apache.org/thread/d3g248pr03x8rvmh8p2t3xdlw0wn5dz2
http://www.openwall.com/lists/oss-security/2022/07/06/1
Related Vulnerabilities
CVE-2023-37942 Vulnerability in maven package org.jenkins-ci.plugins:external-monitor-job
CVE-2019-19771 Vulnerability in npm package bsae-x
CVE-2023-43494 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2020-7753 Vulnerability in npm package trim
CVE-2023-32315 Vulnerability in maven package org.igniterealtime.openfire:xmppserver