The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: OX
Published: 2023-08-02T12:23:25.270Z
Updated: 2024-08-02T11:46:24.519Z
Reserved: 2023-02-22T20:42:56.091Z
Link: CVE-2023-26446
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-08-02T13:15:10.877
Modified: 2024-11-21T07:51:28.387
Link: CVE-2023-26446
Redhat
No data.