You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the saml2/login endpoint when using 3rd party SSO, the idp parameter is vulnerable to cross-site scripting injection due to insufficient input sanitization.
Proof of Concept:
Visit the URL endpoint crypt.domain.com/saml2/login/?idp=<%2fscript><svg/onload=alert(origin)>
This will result in a XSS popup message indicating the attack worked.
This could be combined with data exfiltration Javascript or similar mechanisms to steal user data or session information.
The text was updated successfully, but these errors were encountered:
In the saml2/login endpoint when using 3rd party SSO, the idp parameter is vulnerable to cross-site scripting injection due to insufficient input sanitization.
Proof of Concept:
Visit the URL endpoint crypt.domain.com/saml2/login/?idp=<%2fscript><svg/onload=alert(origin)>
This will result in a XSS popup message indicating the attack worked.
This could be combined with data exfiltration Javascript or similar mechanisms to steal user data or session information.
The text was updated successfully, but these errors were encountered: