Multiple non-persistent Cross-Site Scripting vulnerabilities have been identified [1] in the JAMon web application. JAMon contains a flaw that allows multiple reflected cross-site scripting (XSS) attacks. This flaw exists because certain pages do not validate input before returning it to users. This issue is reported to affect version 2.7, and has not yet been fixed upstream. [1] http://seclists.org/bugtraq/2014/Jan/92
Created jamonapi tracking bugs for this issue: Affects: fedora-all [bug 1057700]
This issue should be of interest to only jamon.war ? If is so then you can close this bug, our package don't provides this artifact. The issues should be related to these files: exceptions.jsp jamonadmin.jsp mondetail.jsp sql.jsp availables only in the WAR file regards
Thank you, Gil. You are correct regarding the WAR file; I just checked the jamon.jar and jamonapi.jar files and these affected files are not there.