Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-42466
- https://lists.apache.org/thread/83ftj5jgtv3mbm28w3trjyvd591jztrz
- https://github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743
- https://github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd
- https://github.com/apache/isis/commit/342255124635013194f63c41a7639f979b3340e8
- https://github.com/apache/isis/commit/a44d53f24a60bcbcbf3919d1b251d5d1e96ba3c2
- https://github.com/apache/isis/commit/c6e9b392de073d1050b56d8209b7c3079d58c600
- https://github.com/apache/isis/commit/cc94a9965a82ba8faac1b151777c44061b178673
- https://issues.apache.org/jira/browse/ISIS-3240
- https://github.com/advisories/GHSA-7pfc-cc9x-8p4m