8.2

CVE-2023-28799

A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ZscalerClient Connector SwPlatformlinux Version < 1.4
ZscalerClient Connector SwPlatformiphone_os Version < 1.9.3
ZscalerClient Connector SwPlatformchrome_os Version < 1.10.1
ZscalerClient Connector SwPlatformandroid Version < 1.10.2
ZscalerClient Connector SwPlatformwindows Version < 3.7
ZscalerClient Connector SwPlatformmacos Version < 3.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.11% 0.308
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cve@zscaler.com 8.2 1.8 5.8
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
CWE-1287 Improper Validation of Specified Type of Input

The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.

CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.