CVE-2023-48226 (GCVE-0-2023-48226)
Vulnerability from cvelistv5 – Published: 2023-11-21 19:37 – Updated: 2024-08-02 21:23
VLAI?
Title
OpenReplay HTML Injection vulnerability
Summary
OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available.
Severity ?
6.5 (Medium)
CWE
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| openreplay | openreplay |
Affected:
= 1.14.0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:23:39.200Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4"
},
{
"name": "https://bugcrowd.com/vulnerability-rating-taxonomy",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugcrowd.com/vulnerability-rating-taxonomy"
},
{
"name": "https://capec.mitre.org/data/definitions/242.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://capec.mitre.org/data/definitions/242.html"
},
{
"name": "https://cwe.mitre.org/data/definitions/20.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"name": "https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "openreplay",
"vendor": "openreplay",
"versions": [
{
"status": "affected",
"version": "= 1.14.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-21T19:37:57.103Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4"
},
{
"name": "https://bugcrowd.com/vulnerability-rating-taxonomy",
"tags": [
"x_refsource_MISC"
],
"url": "https://bugcrowd.com/vulnerability-rating-taxonomy"
},
{
"name": "https://capec.mitre.org/data/definitions/242.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://capec.mitre.org/data/definitions/242.html"
},
{
"name": "https://cwe.mitre.org/data/definitions/20.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"name": "https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421"
}
],
"source": {
"advisory": "GHSA-xpfv-454c-3fj4",
"discovery": "UNKNOWN"
},
"title": "OpenReplay HTML Injection vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-48226",
"datePublished": "2023-11-21T19:37:57.103Z",
"dateReserved": "2023-11-13T13:25:18.480Z",
"dateUpdated": "2024-08-02T21:23:39.200Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openreplay:openreplay:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.15.0\", \"matchCriteriaId\": \"1F237899-546F-4B3B-B7FA-6569D6239747\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available.\"}, {\"lang\": \"es\", \"value\": \"OpenReplay es una suite de reproducci\\u00f3n de sesiones autohospedada. En la versi\\u00f3n 1.14.0, debido a la falta de validaci\\u00f3n del campo Nombre - Configuraci\\u00f3n de la Cuenta (para el registro parece que la validaci\\u00f3n es correcta), un mal actor puede enviar correos electr\\u00f3nicos con c\\u00f3digo HTML inyectado a las v\\u00edctimas. Los malos actores pueden utilizar esto para acciones de phishing, por ejemplo. El correo electr\\u00f3nico en realidad se env\\u00eda desde OpenReplay, pero los malos actores pueden agregar all\\u00ed c\\u00f3digo HTML inyectado (suplantaci\\u00f3n de contenido). Tenga en cuenta que durante los pasos de registro, el nombre completo parece estar validado correctamente; no se puede escribir all\\u00ed, pero al usar este tipo de omisi\\u00f3n/workaround, los malos actores pueden lograr su propio objetivo. En el momento de la publicaci\\u00f3n, no hay soluciones conocidas ni workarounds disponibles.\"}]",
"id": "CVE-2023-48226",
"lastModified": "2024-11-21T08:31:15.013",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N\", \"baseScore\": 3.5, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.1, \"impactScore\": 1.4}]}",
"published": "2023-11-21T20:15:07.543",
"references": "[{\"url\": \"https://bugcrowd.com/vulnerability-rating-taxonomy\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://capec.mitre.org/data/definitions/242.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://cwe.mitre.org/data/definitions/20.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"https://bugcrowd.com/vulnerability-rating-taxonomy\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://capec.mitre.org/data/definitions/242.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://cwe.mitre.org/data/definitions/20.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\"]}, {\"url\": \"https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}, {\"lang\": \"en\", \"value\": \"CWE-94\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-48226\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-11-21T20:15:07.543\",\"lastModified\":\"2024-11-21T08:31:15.013\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available.\"},{\"lang\":\"es\",\"value\":\"OpenReplay es una suite de reproducci\u00f3n de sesiones autohospedada. En la versi\u00f3n 1.14.0, debido a la falta de validaci\u00f3n del campo Nombre - Configuraci\u00f3n de la Cuenta (para el registro parece que la validaci\u00f3n es correcta), un mal actor puede enviar correos electr\u00f3nicos con c\u00f3digo HTML inyectado a las v\u00edctimas. Los malos actores pueden utilizar esto para acciones de phishing, por ejemplo. El correo electr\u00f3nico en realidad se env\u00eda desde OpenReplay, pero los malos actores pueden agregar all\u00ed c\u00f3digo HTML inyectado (suplantaci\u00f3n de contenido). Tenga en cuenta que durante los pasos de registro, el nombre completo parece estar validado correctamente; no se puede escribir all\u00ed, pero al usar este tipo de omisi\u00f3n/workaround, los malos actores pueden lograr su propio objetivo. En el momento de la publicaci\u00f3n, no hay soluciones conocidas ni workarounds disponibles.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openreplay:openreplay:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.15.0\",\"matchCriteriaId\":\"1F237899-546F-4B3B-B7FA-6569D6239747\"}]}]}],\"references\":[{\"url\":\"https://bugcrowd.com/vulnerability-rating-taxonomy\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://capec.mitre.org/data/definitions/242.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://cwe.mitre.org/data/definitions/20.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://bugcrowd.com/vulnerability-rating-taxonomy\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://capec.mitre.org/data/definitions/242.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://cwe.mitre.org/data/definitions/20.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://github.com/openreplay/openreplay/blob/main/api/chalicelib/utils/html/invitation.html#L421\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…