CVE-2023-28799

A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:chrome_os:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:android:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*

History

17 Oct 2024, 15:15

Type Values Removed Values Added
Summary (en) A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.  (en) A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
CWE CWE-20 CWE-1287

30 Jun 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 20:15

Updated : 2024-10-17 15:15


NVD link : CVE-2023-28799

Mitre link : CVE-2023-28799

CVE.ORG link : CVE-2023-28799


JSON object : View

Products Affected

zscaler

  • client_connector
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')

CWE-1287

Improper Validation of Specified Type of Input