Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
CVE-2022-34158 CVSS:6.5
Apache JSPWiki is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the Image plugin. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify the email associated with the attacked account, and then a reset password request from the login page.. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-28732 CVSS:6.1
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the WeblogPlugin. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2022-28731 CVSS:6.5
Apache JSPWiki is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the UserPreferences.jsp script file. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to modify the email associated with the attacked account, and then a reset password request from the login page.. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-28730 CVSS:6.1
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the AJAXPreview.jsp script. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2022-27166 CVSS:6.1
Apache JSPWiki is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the XHRHtml2Markup.jsp script. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Apache
Upgrade to the latest version of Apache JSPWiki, available from the Apache Website.
Apache Website