Cozy version 2 has XSS allowing remote attackers to obtain administrative access via JavaScript code in the url parameter to the /api/proxy URI, as demonstrated by an XMLHttpRequest call with an 'email:"attacker@example.com"' request, which can be followed by a password reset.
References
Link | Resource |
---|---|
http://www.lynxsecurity.io/releases/XSS%20to%20Account%20Takeover%20in%20Cozy%20Cloud.pdf | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-07 17:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-6824
Mitre link : CVE-2018-6824
CVE.ORG link : CVE-2018-6824
JSON object : View
Products Affected
cozy
- cozy
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')