8.2
CVE-2023-28799
- EPSS 0.11%
- Veröffentlicht 22.06.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:02
- Quelle cve@zscaler.com
- Teams Watchlist Login
- Unerledigt Login
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zscaler ≫ Client Connector SwPlatformlinux Version < 1.4
Zscaler ≫ Client Connector SwPlatformiphone_os Version < 1.9.3
Zscaler ≫ Client Connector SwPlatformchrome_os Version < 1.10.1
Zscaler ≫ Client Connector SwPlatformandroid Version < 1.10.2
Zscaler ≫ Client Connector SwPlatformwindows Version < 3.7
Zscaler ≫ Client Connector SwPlatformmacos Version < 3.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.11% | 0.308 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
cve@zscaler.com | 8.2 | 1.8 | 5.8 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
|
CWE-1287 Improper Validation of Specified Type of Input
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.