Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWMyaDYtN2dtOC1jdjR3
XSS in MITREid Connect
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
Permalink: https://github.com/advisories/GHSA-c2h6-7gm8-cv4wJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWMyaDYtN2dtOC1jdjR3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 5 years ago
Updated: about 2 years ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.0084
EPSS Percentile: 0.82023
Identifiers: GHSA-c2h6-7gm8-cv4w, CVE-2020-5497
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-5497
- https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
- https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1526
- https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1527
- https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497
- http://seclists.org/fulldisclosure/2020/Feb/25
- http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html
- https://github.com/advisories/GHSA-c2h6-7gm8-cv4w
Blast Radius: 9.8
Affected Packages
maven:org.mitre:openid-connect-server
Dependent packages: 7Dependent repositories: 40
Downloads:
Affected Version Ranges: <= 1.3.3
No known fixed version
All affected versions: 0.9.0, 0.9.1, 0.9.2, 0.9.3, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.0.9, 1.0.10, 1.0.11, 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.0.16, 1.0.17, 1.0.18, 1.0.19, 1.0.20, 1.0.21, 1.0.22, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.1.10, 1.1.11, 1.1.12, 1.1.13, 1.1.14, 1.1.15, 1.1.16, 1.1.17, 1.1.18, 1.1.19, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.3.0, 1.3.1, 1.3.2, 1.3.3