Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
CUBA JPA Web API Vulnerable to Cross-Site Scripting (XSS) in the /download Endpoint
Vulnerability Description
The Cuba JPA web API enables loading and saving any entities defined in the application data model by sending simple HTTP requests. Prior to version 1.1.1, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 1.1.1. A workaround is provided on the Jmix documentation website.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Cuba JPA web API 跨站脚本漏洞
Vulnerability Description
Cuba JPA web API是CUBA Platform开源的一个用于快速开发企业级 Java 应用的框架组件。 Cuba JPA web API 1.1.1之前版本存在跨站脚本漏洞,该漏洞源于文件路径操作不当,可能导致恶意JavaScript执行。
CVSS Information
N/A
Vulnerability Type
N/A