Utilities.php in the miniorange-saml-20-single-sign-on plugin before 4.8.84 for WordPress allows XSS via a crafted SAML XML Response to wp-login.php. This is related to the SAMLResponse and RelayState variables, and the Destination parameter of the samlp:Response XML element.
References
Link | Resource |
---|---|
https://zeroauth.ltd/blog/ | Exploit Third Party Advisory |
https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/miniorange-saml-20-single-sign-on/#developers | Product Third Party Advisory |
Configurations
Information
Published : 2020-02-17 08:15
Updated : 2020-02-20 09:37
NVD link : CVE-2020-6850
Mitre link : CVE-2020-6850
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
miniorange
- saml_sp_single_sign_on