VYPR
Low severityNVD Advisory· Published May 24, 2006· Updated Apr 16, 2026

CVE-2006-2571

CVE-2006-2571

Description

Cross-site scripting (XSS) vulnerability in search.html in Alkacon OpenCms 6.0.0, 6.0.2, and 6.0.3 allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search action.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.opencms:opencms-coreMaven
>= 6.0.0, < 6.0.46.0.4

Affected products

3
  • Alkacon/Opencms3 versions
    cpe:2.3:a:alkacon:opencms:6.0.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:alkacon:opencms:6.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:alkacon:opencms:6.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:alkacon:opencms:6.0.3:*:*:*:*:*:*:*

Patches

2
9c7389a12c1d

HTML-escape input value to prevent cross site scripting

https://github.com/alkacon/opencms-corejBaudischJan 12, 2006via ghsa
1 file changed · +4 4
  • src-modules/org/opencms/frontend/templateone/form/CmsFormHandler.java+4 4 modified
    @@ -1,7 +1,7 @@
     /*
      * File   : $Source: /alkacon/cvs/opencms/src-modules/org/opencms/frontend/templateone/form/CmsFormHandler.java,v $
    - * Date   : $Date: 2006/01/05 13:11:24 $
    - * Version: $Revision: 1.22 $
    + * Date   : $Date: 2006/01/12 10:09:02 $
    + * Version: $Revision: 1.23 $
      *
      * This library is part of OpenCms -
      * the Open Source Content Mananagement System
    @@ -65,7 +65,7 @@
      * @author Thomas Weckert
      * @author Jan Baudisch
      * 
    - * @version $Revision: 1.22 $ 
    + * @version $Revision: 1.23 $ 
      * 
      * @since 6.0.0 
      */
    @@ -179,7 +179,7 @@ public String convertValue(String value, String outputType) {
     
             if ("html".equalsIgnoreCase(outputType)) {
                 // output should be html, add line break tags and characters
    -            value = CmsStringUtil.substitute(value, "\n", "<br>");
    +            value = CmsStringUtil.escapeHtml(value);
             } else {
                 // output should be plain, remove html line break tags and characters
                 value = CmsStringUtil.substitute(value, "<br>", "\n");
    
dd09a85fae84

HTML-escape search query to prevent cross site scripting

https://github.com/alkacon/opencms-corejBaudischJan 12, 2006via ghsa
1 file changed · +2 2
  • modules/org.opencms.frontend.templateone/resources/system/modules/org.opencms.frontend.templateone/pages/search.html+2 2 modified
    @@ -1,4 +1,4 @@
    -<%@ page session="false" buffer="none" import="java.util.*,org.opencms.search.*,org.opencms.frontend.templateone.*" %><%--
    +<%@ page session="false" buffer="none" import="java.util.*,org.opencms.search.*,org.opencms.frontend.templateone.*,org.opencms.util.*" %><%--
     
     This is the search code page.
     
    @@ -30,7 +30,7 @@ <h2><%= cms.buildSearchHeadline() %></h2>
     <input type="hidden" name="<%= CmsTemplateBean.PARAM_URI %>" value="<%= cms.getRequestContext().getUri() %>" />
     <input type="hidden" name="__locale" value="<%= cms.getRequestContext().getLocale() %>" />
     
    -<span style="vertical-align: middle; padding-left: 4px;"><input type="text" name="query2" class="search" style="width: 350px" value="<%= search.getQuery() %>" /></span>
    +<span style="vertical-align: middle; padding-left: 4px;"><input type="text" name="query2" class="search" style="width: 350px" value="<%= CmsStringUtil.escapeHtml(search.getQuery()) %>" /></span>
     <span style="vertical-align: middle;"><input type="submit" value="<%= cms.key("link.search") %>" class="formbutton" /></span><br />     
     <span style="line-height: 3px; font-size: 1px;">&nbsp;</span><%
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

10

News mentions

0

No linked articles in our index yet.