WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
References
Link | Resource |
---|---|
https://github.com/holomekc/wiremock/issues/51 | Exploit Issue Tracking Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-12-29T00:00:00
Updated: 2023-12-29T20:54:31.313808
Reserved: 2023-12-04T00:00:00
Link: CVE-2023-50069
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-29T21:15:08.713
Modified: 2024-01-05T23:08:29.450
Link: CVE-2023-50069
JSON object: View
Redhat Information
No data.
CWE