cvelist/2020/5xxx/CVE-2020-5497.json
2020-03-01 18:01:09 +00:00

77 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-5497",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521",
"refsource": "MISC",
"name": "https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521"
},
{
"refsource": "MISC",
"name": "https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497",
"url": "https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497"
},
{
"refsource": "FULLDISC",
"name": "20200227 CVE-2020-5497 - MITREid Connect XSS",
"url": "http://seclists.org/fulldisclosure/2020/Feb/25"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html"
}
]
}
}