Aug. 2, 2023, 1:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.

access account actions api code context cve exploit external hijacking interface malicious media resources script service session session hijacking the web web web interface

GCP Incident Response Engineer

@ Publicis Groupe | Dallas, Texas, United States

DevSecOps Engineer - CL - Santiago

@ Globant | Santiago de Chile, Santiago, CL

IT Security Analyst - State Government & Healthcare

@ NTT DATA | Little Rock, AR, US

Exploit Developer

@ Peraton | Fort Meade, MD, United States

Senior Manager, Response Analytics & Insights (Fraud Threat Management)

@ Scotiabank | Toronto, ON, CA, M3C0N5

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | Buffalo, NY, United States