Miggo Logo

CVE-2018-12432: Cross-site Scripting in JavaMelody

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.47285%
Published
5/14/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.bull.javamelody:javamelody-coremaven<= 1.60.01.61.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows the vulnerability stemmed from improper output encoding in HtmlCoreReport.java. The original code used javascriptEncode() alone on user-controlled input when generating alert messages. Since this input was later placed in an HTML script context, it required additional HTML encoding (added via htmlEncodeButNotSpace() in the fix) to prevent XSS. The function writeMessageIfNotNull handles this alert message construction, making it the clear vulnerable point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*v*M*lo*y t*rou** *.**.* **s XSS vi* t** *ount*r p*r*m*t*r in * *l**r_*ount*r **tion to t** /monitorin* URI.

Reasoning

T** *ommit *i** s*ows t** vuln*r**ility st*mm** *rom improp*r output *n*o*in* in `*tml*or*R*port.j*v*`. T** ori*in*l *o** us** `j*v*s*ript*n*o**()` *lon* on us*r-*ontroll** input w**n **n*r*tin* *l*rt m*ss***s. Sin** t*is input w*s l*t*r pl**** in *n