CVE-2023-50069

WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
References
Link Resource
https://github.com/holomekc/wiremock/issues/51 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*

History

05 Jan 2024, 23:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Wiremock
Wiremock wiremock
CPE cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*
CWE CWE-79
References () https://github.com/holomekc/wiremock/issues/51 - () https://github.com/holomekc/wiremock/issues/51 - Exploit, Issue Tracking, Vendor Advisory

29 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-29 21:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-50069

Mitre link : CVE-2023-50069

CVE.ORG link : CVE-2023-50069


JSON object : View

Products Affected

wiremock

  • wiremock
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')