Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-39wq-w29m-4ccv

Опубликовано: 20 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the request parameter "message" values being directly included in a JavaScript block in the response. This is especially critical in business environments using AD SSO authentication, e.g. via ADFS, where attackers could potentially steal AD passwords.

This issue affects Kiuwan SAST: <master.1808.p685.q13371

For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the request parameter "message" values being directly included in a JavaScript block in the response. This is especially critical in business environments using AD SSO authentication, e.g. via ADFS, where attackers could potentially steal AD passwords.

This issue affects Kiuwan SAST: <master.1808.p685.q13371

EPSS

Процентиль: 53%
0.00296
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.5
nvd
больше 1 года назад

For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the request parameter "message" values being directly included in a JavaScript block in the response. This is especially critical in business environments using AD SSO authentication, e.g. via ADFS, where attackers could potentially steal AD passwords. This issue affects Kiuwan SAST: <master.1808.p685.q13371

EPSS

Процентиль: 53%
0.00296
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-79