Weave GitOps Enterprise before 0.9.0-rc.5 has a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permission. The exposure appears in Weave GitOps Enterprise UI via a GitopsCluster dashboard link. An annotation can be added to a GitopsCluster custom resource.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.weave.works/product/gitops-enterprise/ | product vendor advisory |
https://docs.gitops.weave.works/docs/intro | product vendor advisory |
https://docs.gitops.weave.works/docs/cluster-management/getting-started/#profiles-and-clusters | product vendor advisory |
https://docs.gitops.weave.works/security/cve/enterprise/CVE-2022-38790/index.html | patch vendor advisory exploit |