First published: Thu Jun 22 2023(Updated: )
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
Credit: cve@zscaler.com cve@zscaler.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zscaler Client Connector | <1.4 | |
zscaler client connector iphone os | <1.9.3 | |
zscaler client connector chrome os | <1.10.1 | |
zscaler client connector android | <1.10.2 | |
Zscaler Client Connector Windows | <3.7 | |
Zscaler Client Connector | <3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28799 is a vulnerability in Zscaler Client Connector that allows an attacker to insert a malicious domain into a URL parameter during the login flow, which could redirect the user and send the authorization token to the redirected domain.
Zscaler Client Connector versions up to 1.4 for Linux, up to 1.9.3 for iPhone OS, up to 1.10.1 for Chrome OS, up to 1.10.2 for Android, up to 3.7 for Windows, and up to 3.9 for macOS are affected by CVE-2023-28799.
CVE-2023-28799 has a severity rating of 6.1 out of 10, indicating a high level of risk.
To mitigate the vulnerability, it is recommended to update Zscaler Client Connector to the latest version as provided by Zscaler.
You can find more information about CVE-2023-28799 on the Zscaler website: [link].