There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862 | Issue Tracking Patch Third Party Advisory |
https://snyk.io/vuln/npm:knockout:20180213 | Exploit Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2020-01-02 15:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-14862
Mitre link : CVE-2019-14862
CVE.ORG link : CVE-2019-14862
JSON object : View
Products Affected
redhat
- decision_manager
- process_automation
knockoutjs
- knockout
oracle
- business_intelligence
- goldengate
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')