The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions.
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2016-0781 | Vendor Advisory |
https://pivotal.io/security/cve-2016-0781 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://pivotal.io/security/cve-2016-0781 - Vendor Advisory |
Information
Published : 2017-05-25 17:29
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0781
Mitre link : CVE-2016-0781
CVE.ORG link : CVE-2016-0781
JSON object : View
Products Affected
pivotal_software
- cloud_foundry
- login-server
- cloud_foundry_uaa
- cloud_foundry_elastic_runtime
cloudfoundry
- cloud_foundry_uaa_bosh
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')