First published: Thu Jan 02 2020(Updated: )
Knockout is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Knockoutjs Knockout | <=3.4.2 | |
Redhat Decision Manager | =7.0 | |
Redhat Process Automation | =7.0 | |
Oracle Business Intelligence | =5.5.0.0.0 | |
Oracle Business Intelligence | =12.2.1.3.0 | |
Oracle Business Intelligence | =12.2.1.4.0 | |
Oracle GoldenGate | =12.3.0.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14862 is a vulnerability in Knockout before version 3.5.0-beta that allows for cross-site scripting attacks.
CVE-2019-14862 works by improper validation of user-supplied input, allowing a remote attacker to inject malicious scripts that can be executed in a victim's web browser.
The severity of CVE-2019-14862 is medium with a CVSS score of 6.1.
Knockout before version 3.5.0-beta is affected by CVE-2019-14862.
To fix CVE-2019-14862, it is recommended to update to version 3.5.0-beta or later of Knockout.