漏洞标题
开放的回放 HTML 注入漏洞
漏洞描述信息
OpenReplay HTML注入漏洞
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
OpenReplay HTML Injection vulnerability
漏洞描述信息
OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
漏洞类别
输入验证不恰当
漏洞标题
OpenReplay 安全漏洞
漏洞描述信息
OpenReplay是开发人员友好的、自托管的会话重播。 OpenReplay 1.14.0及之前版本版本存在安全漏洞,该漏洞源于缺少对Name field-Account Settings的验证,导致攻击者可以向受害者发送带有HTML注入代码的电子邮件。
CVSS信息
N/A
漏洞类别
其他