Weave GitOps Enterprise before 0.9.0-rc.5 has a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permission. The exposure appears in Weave GitOps Enterprise UI via a GitopsCluster dashboard link. An annotation can be added to a GitopsCluster custom resource.
References
Link | Resource |
---|---|
https://docs.gitops.weave.works/docs/cluster-management/getting-started/#profiles-and-clusters | Product Vendor Advisory |
https://docs.gitops.weave.works/docs/intro | Product Vendor Advisory |
https://docs.gitops.weave.works/security/cve/enterprise/CVE-2022-38790/index.html | Exploit Patch Vendor Advisory |
https://www.weave.works/product/gitops-enterprise/ | Product Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-09-01T12:55:42
Updated: 2022-09-01T12:55:42
Reserved: 2022-08-27T00:00:00
Link: CVE-2022-38790
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-01T13:15:09.070
Modified: 2022-09-07T17:06:30.887
Link: CVE-2022-38790
JSON object: View
Redhat Information
No data.
CWE