First published: Tue Jun 14 2022(Updated: )
A vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions < V1.16.6), Mendix SAML Module (Mendix 8 compatible) (All versions < V2.2.2), Mendix SAML Module (Mendix 9 compatible) (All versions < V3.2.3). In certain configurations SAML module is vulnerable to Cross Site Scripting (XSS) attacks due to insufficient error message sanitation. This could allow an attacker to execute malicious code by tricking users into accessing a malicious link.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | <1.16.6 | |
Mendix | >=2.0.0<2.2.2 | |
Mendix | >=3.0.0<3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32286 is a vulnerability identified in Mendix SAML Module (Mendix 7 compatible), Mendix SAML Module (Mendix 8 compatible), and Mendix SAML Module (Mendix 9 compatible) versions before V1.16.6, V2.2.2, and V3.2.3, respectively.
The severity of CVE-2022-32286 is medium (CVSS score: 6.1).
The affected software for CVE-2022-32286 includes Mendix SAML Module (Mendix 7 compatible), Mendix SAML Module (Mendix 8 compatible), and Mendix SAML Module (Mendix 9 compatible) versions before V1.16.6, V2.2.2, and V3.2.3, respectively.
To fix CVE-2022-32286, it is recommended to upgrade to Mendix SAML Module versions V1.16.6, V2.2.2, or V3.2.3 or later.
The CWE category for CVE-2022-32286 is CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')).