CVE-2019-3873Cross-site Scripting in RED HAT Picketlink

Severity
9.0CRITICALNVD
CNA6.4
EPSS
0.4%
top 39.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateMay 24

Description

It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further attacks.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:HExploitability: 2.3 | Impact: 6.0

Affected Packages3 packages

CVEListV5red_hat/picketlinkas shipped with Jboss Enterprise Application Server 7.2

🔴Vulnerability Details

2
GHSA
GHSA-59jq-66fv-jgww: It was found that Picketlink as shipped with Jboss Enterprise Application Platform 72022-05-24
CVEList
CVE-2019-3873: It was found that Picketlink as shipped with Jboss Enterprise Application Platform 72019-06-12

📋Vendor Advisories

1
Red Hat
picketlink: URL injection via xinclude parameter2019-06-10

💬Community

1
Bugzilla
CVE-2019-3873 picketlink: URL injection via xinclude parameter2019-03-14
CVE-2019-3873 — Cross-site Scripting in RED | cvebase