Description
Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-7922 | Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:30:23.551Z
Reserved: 2020-07-26T00:00:00.000Z
Link: CVE-2020-15951
No data.
Status : Modified
Published: 2020-11-05T15:15:31.157
Modified: 2024-11-21T05:06:31.393
Link: CVE-2020-15951
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD