U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-37581

Change History

CVE Modified by Apache Software Foundation 8/24/2023 5:15:09 AM

Action Type Old Value New Value
Changed Description
Insufficient input validation and sanitation in Weblog Category name, Website About and File Upload features in all versions of Apache Roller on all platforms allows an authenticated user to perform an XSS attack. Mitigation: if you do not have Roller configured for untrusted users, then you need to do nothing because you trust your users to author raw HTML and other web content. If you are running with untrusted users then you should upgrade to Roller 6.1.2 and you should disable Roller's File Upload feature.?

Insufficient input validation and sanitation in Weblog Category name, Website About and File Upload features in all versions of Apache Roller on all platforms allows an authenticated user to perform an XSS attack. Mitigation: if you do not have Roller configured for untrusted users, then you need to do nothing because you trust your users to author raw HTML and other web content. If you are running with untrusted users then you should upgrade to Roller 6.1.2 and you should disable Roller's File Upload feature.?

Added CWE

								
							
							
						
Apache Software Foundation CWE-79
Removed CWE
Apache Software Foundation CWE-20

								
						
Added Reference

								
							
							
						
https://www.openwall.com/lists/oss-security/2023/08/16/1 [No Types Assigned]
Removed Reference
http://www.openwall.com/lists/oss-security/2023/08/16/1 [No Types Assigned]

								
						
Removed CWE Reason
CWE-20 / More specific CWE option available