8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): LOW
DOM-Based XSS in Ory Polis Login Page
Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect. Versions prior to 26.2.0 contain a DOM-based Cross-Site Scripting (XSS) vulnerability in Ory Polis's login functionality. The application improperly trusts a URL parameter (`callbackUrl`), which is passed to `router.push`. An attacker can craft a malicious link that, when opened by an authenticated user (or an unauthenticated user that later logs in), performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. Version 26.2.0 contains a patch for the issue.
References
-
https://github.com/ory/polis/security/advisories/GHSA-3wjr-6gw8-9j22 x_refsource_CONFIRM
-
https://github.com/ory/polis/releases/tag/v26.2.0 x_refsource_MISC
Affected products
- ==< 26.2.0
Matching in nixpkgs
pkgs.persepolis
Download manager GUI written in Python
pkgs.typstPackages.metropolis-polylux
Metropolis style template for Polylux
pkgs.haskellPackages.mighty-metropolis
The Metropolis algorithm
pkgs.typstPackages.modern-innopolis-thesis
Thesis template for Innopolis University
pkgs.typstPackages.metropolis-polylux_0_1_0
Metropolis style template for Polylux
pkgs.typstPackages.modern-innopolis-thesis_0_1_0
Thesis template for Innopolis University
pkgs.typstPackages.modern-innopolis-thesis_0_1_1
Thesis template for Innopolis University
Package maintainers
-
@iFreilicht Felix Uhl <nixpkgs@mail.felix-uhl.de>
-
@cherrypiejam Gongqi Huang
-
@RossSmyth Ross Smyth