Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Access Manager Identity Server Cross-Site Scripting Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Access Manager Identity Server
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: Access Manager Identity Server
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Not specified
CPE: Not specified
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Access Manager Identity Server Cross-Site Scripting Vulnerability

The Access Manager Identity Server is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability to inject and execute arbitrary script code in the browser of a victim user, within the context of the affected website. This can lead to the theft of authentication credentials stored in cookies and enable other malicious activities.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper input validation and sanitization mechanisms to ensure that user-supplied data is properly encoded or stripped of any malicious code. Additionally, web application firewalls (WAFs) can be employed to detect and block malicious XSS payloads.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21921/info

Access Manager Identity Server is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

GET /nidp/idff/sso?RequestID=1234&IssueInstant=<SCRIPT>alert("XSS");</SCRIPT>