Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.immuta.com/ | product |
https://labs.bishopfox.com/advisories | third party advisory exploit |
https://labs.bishopfox.com/advisories/immuta-version-2.8.2 | third party advisory release notes |