Description
The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30266 | The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known. |
References
History
No history.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T11:46:24.519Z
Reserved: 2023-02-22T20:42:56.091Z
Link: CVE-2023-26446
No data.
Status : Modified
Published: 2023-08-02T13:15:10.877
Modified: 2024-11-21T07:51:28.387
Link: CVE-2023-26446
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD