Weave GitOps Enterprise before 0.9.0-rc.5 has a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permission. The exposure appears in Weave GitOps Enterprise UI via a GitopsCluster dashboard link. An annotation can be added to a GitopsCluster custom resource.
References
Link | Resource |
---|---|
https://docs.gitops.weave.works/docs/cluster-management/getting-started/#profiles-and-clusters | Product Vendor Advisory |
https://docs.gitops.weave.works/docs/intro | Product Vendor Advisory |
https://docs.gitops.weave.works/security/cve/enterprise/CVE-2022-38790/index.html | Exploit Patch Vendor Advisory |
https://www.weave.works/product/gitops-enterprise/ | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-09-01 13:15
Updated : 2022-09-07 17:06
NVD link : CVE-2022-38790
Mitre link : CVE-2022-38790
CVE.ORG link : CVE-2022-38790
JSON object : View
Products Affected
weave.works
- gitops
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')