Aug. 2, 2023, 1:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No …

access account actions api code context cve defined exploit handlers hijacking interface log malicious protocol script session session hijacking the web web web interface

GCP Incident Response Engineer

@ Publicis Groupe | Dallas, Texas, United States

DevSecOps Engineer - CL - Santiago

@ Globant | Santiago de Chile, Santiago, CL

IT Security Analyst - State Government & Healthcare

@ NTT DATA | Little Rock, AR, US

Exploit Developer

@ Peraton | Fort Meade, MD, United States

Senior Manager, Response Analytics & Insights (Fraud Threat Management)

@ Scotiabank | Toronto, ON, CA, M3C0N5

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | Buffalo, NY, United States