The vulnerability was discovered within the “FaviconService”. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the “meetings”-function where users can specify an external URL where the online meeting will take place.
The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.
Link | Tags |
---|---|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 | vendor advisory |