First published: Thu Jan 11 2024(Updated: )
The application is vulnerable to Stored Cross-Site Scripting (XSS) in the endpoint /sofer/DocumentService.asc/SaveAnnotation, where input data transmitted via the POST method in the parameters author and text are not adequately sanitized and validated. This allows for the injection of malicious JavaScript code. The vulnerability was identified in the function for adding new annotations while editing document content. Reporters inform that the vulnerability has been removed in software versions above 11.1.x. Previous versions may also be vulnerable, but this has not been confirmed.
Credit: cvd@cert.pl
Affected Software | Affected Version | How to fix |
---|---|---|
Kofax Capture | <=11.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5118 is classified as a high severity vulnerability due to the potential for Stored Cross-Site Scripting (XSS) attacks.
To remediate CVE-2023-5118, ensure that input validation and sanitization are implemented for the parameters author and text in the /sofer/DocumentService.asc/SaveAnnotation endpoint.
CVE-2023-5118 affects Tungstenautomation Kofax Capture versions up to and including 11.0.0.
CVE-2023-5118 allows for Stored Cross-Site Scripting (XSS) attacks, which can inject malicious scripts into web pages viewed by users.
Exploitation of CVE-2023-5118 could lead to unauthorized access, data manipulation, and the execution of malicious scripts in the context of an affected user.