A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 6.8 |
References | () http://packetstormsecurity.com/files/171782/Palo-Alto-Cortex-XSOAR-6.5.0-Cross-Site-Scripting.html - | |
References | () https://security.paloaltonetworks.com/CVE-2022-0020 - Vendor Advisory |
Information
Published : 2022-02-10 18:15
Updated : 2024-11-21 06:37
NVD link : CVE-2022-0020
Mitre link : CVE-2022-0020
CVE.ORG link : CVE-2022-0020
JSON object : View
Products Affected
paloaltonetworks
- cortex_xsoar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')