The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T11:46:24.519Z
Reserved: 2023-02-22T20:42:56.091Z
Link: CVE-2023-26446

No data.

Status : Modified
Published: 2023-08-02T13:15:10.877
Modified: 2024-11-21T07:51:28.387
Link: CVE-2023-26446

No data.