The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
References
Link | Resource |
---|---|
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521 | Exploit Issue Tracking Third Party Advisory |
https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497 | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Feb/25 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-01-03 19:15
Updated : 2023-01-23 17:59
NVD link : CVE-2020-5497
Mitre link : CVE-2020-5497
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
mitreid
- connect