Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.
References
Link Resource
https://labs.bishopfox.com/advisories Exploit Third Party Advisory
https://labs.bishopfox.com/advisories/immuta-version-2.8.2 Release Notes Third Party Advisory
https://www.immuta.com/ Product
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-11-05T14:33:04

Updated: 2020-11-05T14:33:04

Reserved: 2020-07-26T00:00:00


Link: CVE-2020-15951

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-11-05T15:15:31.157

Modified: 2021-07-21T11:39:23.747


Link: CVE-2020-15951

JSON object: View

cve-icon Redhat Information

No data.

CWE