CVE-2023-49111 Vulnerability Details

  /     /     /  

CVE-2023-49111 Metadata Quick Info

CVE Published: 20/06/2024 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: SEC-VLab | Vendor: Kiuwan | Product: SAST
Status : PUBLISHED

CVE-2023-49111 Description

For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the request parameter "message" values being directly included in a JavaScript block in the response. This is especially critical in business environments using AD SSO authentication, e.g. via ADFS, where attackers could potentially steal AD passwords. This issue affects Kiuwan SAST:

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-79
CWE Name: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or Cross-site Scripting )
Source: Kiuwan

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-593
CAPEC Description: CAPEC-593 Session Hijacking


Source: NVD (National Vulnerability Database).