CVE-2023-48226
CVSS V2 None
CVSS V3 None
Description
OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available.
Overview
- CVE ID
- CVE-2023-48226
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-11-21T19:37:57.103Z
- Last Modified Date
- 2023-11-21T19:37:57.103Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4 | x_refsource_CONFIRM |
https://bugcrowd.com/vulnerability-rating-taxonomy | x_refsource_MISC |
https://capec.mitre.org/data/definitions/242.html | x_refsource_MISC |
https://cwe.mitre.org/data/definitions/20.html | x_refsource_MISC |
https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-48226 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48226 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 00:19:57 | Added to TrackCVE |