CVE-2023-5562 (GCVE-0-2023-5562)
Vulnerability from cvelistv5 – Published: 2023-10-12 19:00 – Updated: 2024-09-18 15:02
VLAI?
Summary
An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.
KNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.
KNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor's knime.ini.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| KNIME | KNIME Analytics Platform |
Affected:
0 , < 5.2.0
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:59:44.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.knime.com/security/advisories#CVE-2023-5562"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-5562",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-18T15:01:52.714683Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-18T15:02:03.398Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"JavaScript views"
],
"product": "KNIME Analytics Platform",
"vendor": "KNIME",
"versions": [
{
"lessThan": "5.2.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2023-10-12T19:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003eAn unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\"\u003ehttps://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\u003c/a\u003e. However, these are off by default which allows for cross-site scripting attacks.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor\u0027s knime.ini.\u003cbr\u003e\u003c/div\u003e"
}
],
"value": "An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\n\n\n\n\nKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.\n\n\nKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor\u0027s knime.ini.\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-12T19:00:54.732Z",
"orgId": "296541fb-a0e3-4ca7-ab3d-683e666d143e",
"shortName": "KNIME"
},
"references": [
{
"url": "https://www.knime.com/security/advisories#CVE-2023-5562"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Unsafe default allows for cross-site scripting attacks in KNIME Server and KNIME Business Hub",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Sanitization can be enabled for all affected JavaScript-based views by adding \u003ccode\u003e-Djs.core.sanitize.clientHTML=true\u003c/code\u003e to the executor\u0027s knime.ini. See \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\"\u003ehttps://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\u003c/a\u003e for more details.\u003cbr\u003e"
}
],
"value": "Sanitization can be enabled for all affected JavaScript-based views by adding -Djs.core.sanitize.clientHTML=true to the executor\u0027s knime.ini. See https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal for more details.\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "296541fb-a0e3-4ca7-ab3d-683e666d143e",
"assignerShortName": "KNIME",
"cveId": "CVE-2023-5562",
"datePublished": "2023-10-12T19:00:54.732Z",
"dateReserved": "2023-10-12T18:31:19.504Z",
"dateUpdated": "2024-09-18T15:02:03.398Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:knime:knime_analytics_platform:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.2.0\", \"matchCriteriaId\": \"3D912A75-E051-445D-B503-5BB95AB0A802\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\\n\\n\\n\\n\\nKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.\\n\\n\\nKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor\u0027s knime.ini.\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Una configuraci\\u00f3n predeterminada insegura en KNIME Analytics Platform anterior a 5.2.0 permite un ataque de Cross-Site Scripting (XSS). Cuando se utiliza KNIME Analytics Platform como ejecutor de KNIME Server o KNIME Business Hub, varios nodos de vista basados en JavaScript no sanitizan los datos que se muestran de forma predeterminada. Si los datos a mostrar contienen JavaScript, este c\\u00f3digo se ejecuta en el navegador y puede realizar cualquier operaci\\u00f3n que el usuario actual pueda realizar de forma silenciosa. KNIME Analytics Platform ya cuenta con opciones de configuraci\\u00f3n con las que se puede activar la sanitizaci\\u00f3n de datos, consulte https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal, https://docs.knime.com/ \\u00faltimo/webportal_admin_guide/index.html#html-sanitizaci\\u00f3n-webportal. Sin embargo, est\\u00e1n desactivados de forma predeterminada, lo que permite ataques de Cross-Site Scripting (XSS). KNIME Analytics Platform 5.2.0 habilitar\\u00e1 la sanitizaci\\u00f3n de forma predeterminada. Para todas las versiones anteriores, recomendamos a los usuarios agregar las configuraciones correspondientes al knime.ini del ejecutor.\"}]",
"id": "CVE-2023-5562",
"lastModified": "2024-11-21T08:42:01.327",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@knime.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
"published": "2023-10-12T20:15:12.583",
"references": "[{\"url\": \"https://www.knime.com/security/advisories#CVE-2023-5562\", \"source\": \"security@knime.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.knime.com/security/advisories#CVE-2023-5562\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@knime.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@knime.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-5562\",\"sourceIdentifier\":\"security@knime.com\",\"published\":\"2023-10-12T20:15:12.583\",\"lastModified\":\"2024-11-21T08:42:01.327\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\\n\\n\\n\\n\\nKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.\\n\\n\\nKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor\u0027s knime.ini.\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una configuraci\u00f3n predeterminada insegura en KNIME Analytics Platform anterior a 5.2.0 permite un ataque de Cross-Site Scripting (XSS). Cuando se utiliza KNIME Analytics Platform como ejecutor de KNIME Server o KNIME Business Hub, varios nodos de vista basados en JavaScript no sanitizan los datos que se muestran de forma predeterminada. Si los datos a mostrar contienen JavaScript, este c\u00f3digo se ejecuta en el navegador y puede realizar cualquier operaci\u00f3n que el usuario actual pueda realizar de forma silenciosa. KNIME Analytics Platform ya cuenta con opciones de configuraci\u00f3n con las que se puede activar la sanitizaci\u00f3n de datos, consulte https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal, https://docs.knime.com/ \u00faltimo/webportal_admin_guide/index.html#html-sanitizaci\u00f3n-webportal. Sin embargo, est\u00e1n desactivados de forma predeterminada, lo que permite ataques de Cross-Site Scripting (XSS). KNIME Analytics Platform 5.2.0 habilitar\u00e1 la sanitizaci\u00f3n de forma predeterminada. Para todas las versiones anteriores, recomendamos a los usuarios agregar las configuraciones correspondientes al knime.ini del ejecutor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@knime.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security@knime.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:knime:knime_analytics_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.0\",\"matchCriteriaId\":\"3D912A75-E051-445D-B503-5BB95AB0A802\"}]}]}],\"references\":[{\"url\":\"https://www.knime.com/security/advisories#CVE-2023-5562\",\"source\":\"security@knime.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.knime.com/security/advisories#CVE-2023-5562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.knime.com/security/advisories#CVE-2023-5562\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:59:44.813Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-5562\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-18T15:01:52.714683Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-18T15:01:58.883Z\"}}], \"cna\": {\"title\": \"Unsafe default allows for cross-site scripting attacks in KNIME Server and KNIME Business Hub\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-63\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-63 Cross-Site Scripting (XSS)\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"KNIME\", \"modules\": [\"JavaScript views\"], \"product\": \"KNIME Analytics Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"5.2.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-10-12T19:00:00.000Z\", \"references\": [{\"url\": \"https://www.knime.com/security/advisories#CVE-2023-5562\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Sanitization can be enabled for all affected JavaScript-based views by adding -Djs.core.sanitize.clientHTML=true to the executor\u0027s knime.ini. See https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal for more details.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Sanitization can be enabled for all affected JavaScript-based views by adding \u003ccode\u003e-Djs.core.sanitize.clientHTML=true\u003c/code\u003e to the executor\u0027s knime.ini. See \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\\\"\u003ehttps://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\u003c/a\u003e for more details.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\\n\\n\\n\\n\\nKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.\\n\\n\\nKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor\u0027s knime.ini.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003eAn unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\\\"\u003ehttps://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal\u003c/a\u003e. However, these are off by default which allows for cross-site scripting attacks.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor\u0027s knime.ini.\u003cbr\u003e\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"296541fb-a0e3-4ca7-ab3d-683e666d143e\", \"shortName\": \"KNIME\", \"dateUpdated\": \"2023-10-12T19:00:54.732Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-5562\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-18T15:02:03.398Z\", \"dateReserved\": \"2023-10-12T18:31:19.504Z\", \"assignerOrgId\": \"296541fb-a0e3-4ca7-ab3d-683e666d143e\", \"datePublished\": \"2023-10-12T19:00:54.732Z\", \"assignerShortName\": \"KNIME\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…