Low severityNVD Advisory· Published May 24, 2006· Updated Apr 16, 2026
CVE-2006-2571
CVE-2006-2571
Description
Cross-site scripting (XSS) vulnerability in search.html in Alkacon OpenCms 6.0.0, 6.0.2, and 6.0.3 allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search action.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.opencms:opencms-coreMaven | >= 6.0.0, < 6.0.4 | 6.0.4 |
Affected products
3Patches
29c7389a12c1dHTML-escape input value to prevent cross site scripting
1 file changed · +4 −4
src-modules/org/opencms/frontend/templateone/form/CmsFormHandler.java+4 −4 modified@@ -1,7 +1,7 @@ /* * File : $Source: /alkacon/cvs/opencms/src-modules/org/opencms/frontend/templateone/form/CmsFormHandler.java,v $ - * Date : $Date: 2006/01/05 13:11:24 $ - * Version: $Revision: 1.22 $ + * Date : $Date: 2006/01/12 10:09:02 $ + * Version: $Revision: 1.23 $ * * This library is part of OpenCms - * the Open Source Content Mananagement System @@ -65,7 +65,7 @@ * @author Thomas Weckert * @author Jan Baudisch * - * @version $Revision: 1.22 $ + * @version $Revision: 1.23 $ * * @since 6.0.0 */ @@ -179,7 +179,7 @@ public String convertValue(String value, String outputType) { if ("html".equalsIgnoreCase(outputType)) { // output should be html, add line break tags and characters - value = CmsStringUtil.substitute(value, "\n", "<br>"); + value = CmsStringUtil.escapeHtml(value); } else { // output should be plain, remove html line break tags and characters value = CmsStringUtil.substitute(value, "<br>", "\n");
dd09a85fae84HTML-escape search query to prevent cross site scripting
1 file changed · +2 −2
modules/org.opencms.frontend.templateone/resources/system/modules/org.opencms.frontend.templateone/pages/search.html+2 −2 modified@@ -1,4 +1,4 @@ -<%@ page session="false" buffer="none" import="java.util.*,org.opencms.search.*,org.opencms.frontend.templateone.*" %><%-- +<%@ page session="false" buffer="none" import="java.util.*,org.opencms.search.*,org.opencms.frontend.templateone.*,org.opencms.util.*" %><%-- This is the search code page. @@ -30,7 +30,7 @@ <h2><%= cms.buildSearchHeadline() %></h2> <input type="hidden" name="<%= CmsTemplateBean.PARAM_URI %>" value="<%= cms.getRequestContext().getUri() %>" /> <input type="hidden" name="__locale" value="<%= cms.getRequestContext().getLocale() %>" /> -<span style="vertical-align: middle; padding-left: 4px;"><input type="text" name="query2" class="search" style="width: 350px" value="<%= search.getQuery() %>" /></span> +<span style="vertical-align: middle; padding-left: 4px;"><input type="text" name="query2" class="search" style="width: 350px" value="<%= CmsStringUtil.escapeHtml(search.getQuery()) %>" /></span> <span style="vertical-align: middle;"><input type="submit" value="<%= cms.key("link.search") %>" class="formbutton" /></span><br /> <span style="line-height: 3px; font-size: 1px;"> </span><%
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
10- secunia.com/advisories/20251nvdPatchVendor Advisory
- www.eazel.es/media/advisory002-OpenCms-Xml-Content-Demo-search-engine-Cross-site-scripting.htmlnvdExploit
- github.com/advisories/GHSA-pmfx-p95x-cg4pghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2006-2571ghsaADVISORY
- github.com/alkacon/opencms-core/commit/9c7389a12c1d13879fc0bc2e9ce103b742c7ada5ghsaWEB
- github.com/alkacon/opencms-core/commit/dd09a85fae8405052906e426a91c1e8483356c53ghsaWEB
- securitytracker.com/idnvd
- www.osvdb.org/25710nvd
- www.securityfocus.com/archive/1/434932/100/0/threadednvd
- www.vupen.com/english/advisories/2006/1931nvd
News mentions
0No linked articles in our index yet.