Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.jboss.hal/hal-console@3.7.10.Final |
| Type | maven |
| Namespace | org.jboss.hal |
| Name | hal-console |
| Version | 3.7.10.Final |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.7.11.Final |
| Latest_non_vulnerable_version | 3.7.11.Final |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-8ew2-s4a9-u7cu |
| vulnerability_id |
VCID-8ew2-s4a9-u7cu |
| summary |
HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store
A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities.
### Impact
Cross-site scripting (XSS) vulnerability in the management console.
### Patches
Fixed in [HAL 3.7.11.Final](https://github.com/hal/console/releases/tag/v3.7.11)
### Workarounds
No workaround available |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-2901, GHSA-f7jh-m6wp-jm7f
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ew2-s4a9-u7cu |
|
| 1 |
| url |
VCID-zufu-x8dx-xygs |
| vulnerability_id |
VCID-zufu-x8dx-xygs |
| summary |
Duplicate Advisory: HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store
# Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-f7jh-m6wp-jm7f. This link is maintained to preserve external references.
# Original Description
A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-hp88-hfjw-2hg4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zufu-x8dx-xygs |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.hal/hal-console@3.7.10.Final |