Description
Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0601 | Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name. |
Github GHSA |
GHSA-qpxp-5j56-gg3x | samlr XML nodes comment attack |
References
| Link | Providers |
|---|---|
| https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:12:29.361Z
Reserved: 2019-07-26T00:00:00.000Z
Link: CVE-2018-20857
No data.
Status : Modified
Published: 2019-07-26T12:15:11.400
Modified: 2024-11-21T04:02:19.603
Link: CVE-2018-20857
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA