The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521 | Exploit Issue Tracking Third Party Advisory | 
| https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497 | Exploit Third Party Advisory | 
| http://seclists.org/fulldisclosure/2020/Feb/25 | Mailing List Third Party Advisory | 
| http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Information
                Published : 2020-01-03 19:15
Updated : 2023-01-23 17:59
NVD link : CVE-2020-5497
Mitre link : CVE-2020-5497
JSON object : View
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
                mitreid
- connect
 


