In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post.
References
Link | Resource |
---|---|
https://wpvulndb.com/vulnerabilities/9397 | |
https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss/ | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9397 | |
https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpvulndb.com/vulnerabilities/9397 - | |
References | () https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss/ - Exploit, Third Party Advisory |
Information
Published : 2019-06-24 21:15
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12346
Mitre link : CVE-2019-12346
CVE.ORG link : CVE-2019-12346
JSON object : View
Products Affected
miniorange
- saml_sp_single_sign_on
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')