Description
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
Remediation
References
http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Feb/25
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521
https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497
Related Vulnerabilities
CVE-2022-22984 Vulnerability in npm package snyk-sbt-plugin
CVE-2020-7789 Vulnerability in maven package org.webjars.npm:node-notifier
CVE-2020-6428 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-36048 Vulnerability in maven package org.webjars.bower:engine.io
CVE-2021-20323 Vulnerability in maven package org.keycloak:keycloak-core