A stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page.
References
Link | Resource |
---|---|
https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b | Patch Third Party Advisory |
https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b | Patch Third Party Advisory |
https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-11-21 20:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4105
Mitre link : CVE-2022-4105
CVE.ORG link : CVE-2022-4105
JSON object : View
Products Affected
kiwitcms
- kiwi_tcms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')