OpenRASP is a RASP solution that directly integrates its protection engine into the application server by instrumentation. There exists a reflected XSS in the /login page due to a reflection of the redirect parameter. This allows an attacker to execute arbitrary javascript with the permissions of a user after the user logins with their account.
References
Configurations
No configuration.
History
21 Nov 2024, 09:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/baidu/openrasp/commit/240fde3901c7a36aaade3683ffd5c89140a535fb - | |
References | () https://securitylab.github.com/advisories/GHSL-2023-253_openrasp - | |
Summary |
|
19 Apr 2024, 16:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-19 16:15
Updated : 2024-11-21 09:07
NVD link : CVE-2024-29183
Mitre link : CVE-2024-29183
CVE.ORG link : CVE-2024-29183
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')