{"containers":{"cna":{"affected":[{"product":"Apache Jena Fuseki","vendor":"Apache Software Foundation","versions":[{"status":"affected","version":"Apache Jena Fuseki2 2.0.0 to 4.0.0"}]}],"credits":[{"lang":"en","value":"Apache Jena would like to thank Luka Safonov for reporting this issue."}],"descriptions":[{"lang":"en","value":"A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive)."}],"metrics":[{"other":{"content":{"other":"Medium"},"type":"unknown"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79, type 0 and type 2.","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-07-05T09:15:11.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["x_refsource_MISC"],"url":"https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"}],"source":{"discovery":"UNKNOWN"},"title":"Display information UI XSS","workarounds":[{"lang":"en","value":"Users are advised to upgrade to Apache Jena 4.1.0 or later."}],"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2021-33192","STATE":"PUBLIC","TITLE":"Display information UI XSS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Jena Fuseki","version":{"version_data":[{"version_name":"Apache Jena Fuseki2","version_value":"2.0.0 to 4.0.0"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"credit":[{"lang":"eng","value":"Apache Jena would like to thank Luka Safonov for reporting this issue."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive)."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":[{"other":"Medium"}],"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79, type 0 and type 2."}]}]},"references":{"reference_data":[{"name":"https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E","refsource":"MISC","url":"https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"}]},"source":{"discovery":"UNKNOWN"},"work_around":[{"lang":"en","value":"Users are advised to upgrade to Apache Jena 4.1.0 or later."}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:42:20.271Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2021-33192","datePublished":"2021-07-05T09:15:11.000Z","dateReserved":"2021-05-19T00:00:00.000Z","dateUpdated":"2024-08-03T23:42:20.271Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}