CVE-2020-6850

Utilities.php in the miniorange-saml-20-single-sign-on plugin before 4.8.84 for WordPress allows XSS via a crafted SAML XML Response to wp-login.php. This is related to the SAMLResponse and RelayState variables, and the Destination parameter of the samlp:Response XML element.
Configurations

Configuration 1 (hide)

cpe:2.3:a:miniorange:saml_sp_single_sign_on:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://wordpress.org/plugins/miniorange-saml-20-single-sign-on/#developers - Product, Third Party Advisory () https://wordpress.org/plugins/miniorange-saml-20-single-sign-on/#developers - Product, Third Party Advisory
References () https://zeroauth.ltd/blog/ - Exploit, Third Party Advisory () https://zeroauth.ltd/blog/ - Exploit, Third Party Advisory
References () https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response/ - Exploit, Third Party Advisory () https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response/ - Exploit, Third Party Advisory

Information

Published : 2020-02-17 16:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-6850

Mitre link : CVE-2020-6850

CVE.ORG link : CVE-2020-6850


JSON object : View

Products Affected

miniorange

  • saml_sp_single_sign_on
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')