Page tree
Skip to end of metadata
Go to start of metadata
1MidPoint user interface clickjacking21 Mar 2019MediumMidPoint user interface vulnerable to clickjacking due to missing X-Frame-Options header.
2Abuse of expressions in midPoint reports8 Apr 2019MediumMidPoint expressions embedded in midPoint reports can be used to gain unauthorized access to the system.
3XXE Vulnerabilities17 Apr 2019MediumThe way how MidPoint handles XML documents is vulnerable to attacks based on XML External Entities (XXE)
4AD and LDAP connectors do not check certificate validity17 Apr 2019HighLDAP and Active Directory connectors are not properly checking TLS/SSL certificate validity.
5Workitem identifier weakness18 Apr 2019MediumAny approver can display any workitem by guessing its short identifier.
6Plain text password in temporary files13 May 2019LowPlaintext password is sometimes left stored in temporary files on a file system.
7Plain text password in task objects in repository23 May 2019LowPlaintext passwords are sometimes stored in task objects in the repository (database).
8XSS Vulnerability In displayName14 Jun 2019LowCross-site scripting (XSS) vulnerability exists in some parts of midPoint user interface, namely in organization displayName.
9SOAP Web Service Vulnerable To Brute Force Attack9 Jul 2019MediumSOAP-based web service interface of midPoint does not limit authentication attempts.
10Authorizations not applied properly to preview changes30 Jul 2019MediumAuthorizations not applied properly to the results of "preview changes" functionality.
11Stored XSS vulnerability via 'name' property30 Aug 2019MediumStored cross-site scripting (XSS) vulnerability exists in midPoint user interface that can be exploited by manipulation of object 'name' property.
12User changes and user session updates9 Sep 2019LowSessions of users logged-in to midPoint user interface are unaffected by the change of user profiles - until users log in again.
13HTTP error codes used for SecQ REST authentication reveal user existence11 Oct 2019LowHTTP error codes used for REST authentication based on security questions (a.k.a. SecQ) reveal user existence.
14Ghostcat Vulnerability of Apache Tomcat2 Mar 2020InformationalApache JServ Protocol (AJP) of Apache Tomcat may be vulnerable to several types of attack.
  • No labels