{ "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-36737", "STATE": "PUBLIC", "TITLE": "XSS in V3 Demo Portlet" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Portals", "version": { "version_data": [ { "version_affected": "=", "version_name": "org.apache.portals.pluto:PortletV3Demo", "version_value": "3.0.0" }, { "version_affected": "=", "version_name": "org.apache.portals.pluto:PortletV3Demo", "version_value": "3.0.1" }, { "version_affected": "=", "version_name": "org.apache.portals.pluto.demo:v3-demo-portlet", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Dhiraj Mishra for reporting." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "low" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "url": "https://lists.apache.org/thread/x7kt47bf358x8sg9qg02zt0dmdrtow25", "name": "https://lists.apache.org/thread/x7kt47bf358x8sg9qg02zt0dmdrtow25" } ] }, "source": { "discovery": "UNKNOWN" }, "work_around": [ { "lang": "eng", "value": "* Uninstall the v3-demo-portlet.war artifact\n -or-\n* Migrate to version 3.1.1 of the v3-demo-portlet.war artifact" } ] }