CVE-2024-5478

CVSS v3 Score
7.4
High

Vulnerability Description

A Cross-site Scripting (XSS) vulnerability exists in the SAML metadata endpoint `/auth/saml/${org?.id}/metadata` of lunary-ai/lunary version 1.2.7. The vulnerability arises due to the application's failure to escape or validate the `orgId` parameter supplied by the user before incorporating it into the generated response. Specifically, the endpoint generates XML responses for SAML metadata, where the `orgId` parameter is directly embedded into the XML structure without proper sanitization or validation. This flaw allows an attacker to inject arbitrary JavaScript code into the generated SAML metadata page, leading to potential theft of user cookies or authentication tokens.

CVSS:7.4(High)

The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cro...

CWE-792016
CVSS:7.4(High)

Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network...

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the address/ URI.

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI.

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the blog/ URI.

CWE-792019
CVSS:7.4(High)

ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the contact/ URI.

CWE-792019