AlgoSec – FireFlow Reflected Cross-Site-Scripting (RXSS) A malicious user injects JavaScript code into a parameter called IntersectudRule on the search/result.html page. The malicious user changes the request from POST to GET and sends the URL to another user (victim). JavaScript code is executed on the browser of the other user.
References
Link | Resource |
---|---|
https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Oct 2022, 13:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:algosec:fireflow:*:*:*:*:*:*:*:* | |
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://www.gov.il/en/Departments/faq/cve_advisories - Third Party Advisory |
26 Oct 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | AlgoSec – FireFlow Reflected Cross-Site-Scripting (RXSS) A malicious user injects JavaScript code into a parameter called IntersectudRule on the search/result.html page. The malicious user changes the request from POST to GET and sends the URL to another user (victim). JavaScript code is executed on the browser of the other user. |
25 Oct 2022, 17:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-25 17:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-36783
Mitre link : CVE-2022-36783
CVE.ORG link : CVE-2022-36783
JSON object : View
Products Affected
algosec
- fireflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')