WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
References
Link | Resource |
---|---|
https://github.com/holomekc/wiremock/issues/51 | Exploit Issue Tracking Vendor Advisory |
https://github.com/holomekc/wiremock/issues/51 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 08:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/holomekc/wiremock/issues/51 - Exploit, Issue Tracking, Vendor Advisory |
05 Jan 2024, 23:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Wiremock
Wiremock wiremock |
|
CWE | CWE-79 | |
References | () https://github.com/holomekc/wiremock/issues/51 - Exploit, Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:* |
29 Dec 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-29 21:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50069
Mitre link : CVE-2023-50069
CVE.ORG link : CVE-2023-50069
JSON object : View
Products Affected
wiremock
- wiremock
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')