The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521 | issue tracking exploit third party advisory |
https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497 | third party advisory exploit |
http://seclists.org/fulldisclosure/2020/Feb/25 | third party advisory mailing list |
http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html | exploit vdb entry third party advisory |