A stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page.
References
Link | Resource |
---|---|
https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b | Patch Third Party Advisory |
https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b | Patch Third Party Advisory |
https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2022-11-21 20:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4105
Mitre link : CVE-2022-4105
CVE.ORG link : CVE-2022-4105
JSON object : View
Products Affected
kiwitcms
- kiwi_tcms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')