Description
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
Remediation
References
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497
http://seclists.org/fulldisclosure/2020/Feb/25
http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html
Related Vulnerabilities
CVE-2023-36479 Vulnerability in maven package org.eclipse.jetty:jetty-servlets
CVE-2022-43424 Vulnerability in maven package com.compuware.jenkins:compuware-xpediter-code-coverage
CVE-2020-14968 Vulnerability in maven package org.webjars.bowergithub.kjur:jsrsasign
CVE-2021-42697 Vulnerability in maven package com.typesafe.akka:akka-http-core
CVE-2020-15119 Vulnerability in maven package org.webjars.bower:auth0-lock