Aug. 9, 2023, 9:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

An authenticated attacker with administrative access to the appliance can inject malicious JavaScript code inside the definition of a Threat Intelligence rule, that will later be executed by another legitimate user viewing the details of such a rule.
An attacker may be able to perform unauthorized actions on behalf of legitimate users. JavaScript injection was possible in the content for Yara rules, while limited HTML injection has been proven for packet and STYX rules.
The injected code will be executed …

access actions code cve definition guardian inject injection intelligence javascript javascript injection malicious may threat threat intelligence

Cyber Software Engineering, Senior Advisor

@ Peraton | Annapolis Junction, MD, United States

Cybersecurity Architect, Lead (NJUS)

@ NetJets | Columbus, OH, US, 43219

Security Operations Analyst

@ Commonwealth Financial Network | Waltham, MA, United States

Penetration Tester – Senior Associate - Cybersecurity

@ JPMorgan Chase & Co. | Buenos Aires, Argentina

Manager - Endpoint Security

@ Novo Nordisk | Bengaluru, Karnataka, IN

Senior Officer, Identity Access Management Administrator, Group Information Security (Contract)

@ UOB | Singapore (City Area), SG, 048624