A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1891016 | Exploit Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1891016 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1891016 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2021-05-28 11:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25715
Mitre link : CVE-2020-25715
CVE.ORG link : CVE-2020-25715
JSON object : View
Products Affected
dogtagpki
- dogtagpki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')