cve/2022/CVE-2022-46823.md
2024-05-25 21:48:12 +02:00

22 lines
1.6 KiB
Markdown

### [CVE-2022-46823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46823)
![](https://img.shields.io/static/v1?label=Product&message=Mendix%20SAML%20(Mendix%208%20compatible)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Mendix%20SAML%20(Mendix%209%20compatible%2C%20New%20Track)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Mendix%20SAML%20(Mendix%209%20compatible%2C%20Upgrade%20Track)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20%3E%3D%20V2.3.0%20%3C%20V2.3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20%3E%3D%20V3.3.0%20%3C%20V3.3.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20%3E%3D%20V3.3.0%20%3C%20V3.3.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
A vulnerability has been identified in Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.3.4), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.0 < V3.3.9), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.3.8). The affected module is vulnerable to reflected cross-site scripting (XSS) attacks. This could allow an attacker to extract sensitive information by tricking users into accessing a malicious link.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/karimhabush/cyberowl