Vulnerability Description
For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the request parameter "message" values being directly included in a JavaScript block in the response. This is especially critical in business environments using AD SSO authentication, e.g. via ADFS, where attackers could potentially steal AD passwords. This issue affects Kiuwan SAST: <master.1808.p685.q13371
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://r.sec-consult.com/kiuwan
- https://www.kiuwan.com/docs/display/K5/%5B2024-05-30%5D+Change+Log
- http://seclists.org/fulldisclosure/2024/Jun/3
- https://r.sec-consult.com/kiuwan
- https://www.kiuwan.com/docs/display/K5/%5B2024-05-30%5D+Change+Log
FAQ
What is CVE-2023-49111?
CVE-2023-49111 is a vulnerability with a CVSS score of 6.5 (MEDIUM). For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the requ...
How severe is CVE-2023-49111?
CVE-2023-49111 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49111?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.