CVE-2023-28799

A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain. 
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:chrome_os:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:android:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*
cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*

History

No history.

Information

Published : 2023-06-22 20:15

Updated : 2023-06-30 17:15


NVD link : CVE-2023-28799

Mitre link : CVE-2023-28799

CVE.ORG link : CVE-2023-28799


JSON object : View

Products Affected

zscaler

  • client_connector
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')

CWE-20

Improper Input Validation