
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability was discovered in snoyberg keter versions up to 1.8.1, specifically affecting the host field in the Keter/Proxy.hs file. The vulnerability was disclosed on January 5, 2023, and was assigned CVE-2022-4877. The issue allows an attacker to inject malicious JavaScript or HTML code through the host field, which could be used to trick users (VulDB).
The vulnerability stems from improper neutralization of user-controllable input in the host field before it is placed in output that is served to other users. The issue is classified as CWE-79 (Cross-site Scripting). The host field could be spoofed to include malicious JavaScript or HTML content, which would then be rendered in the default response for unrecognized hosts (GitHub Commit).
The vulnerability affects the integrity of the system by allowing attackers to inject and execute arbitrary web scripts or HTML in the context of other users' browsers. This could potentially lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the affected user's session (VulDB).
The vulnerability has been fixed in version 1.8.2 of snoyberg keter. The fix involves properly escaping HTML content in the host field before rendering it in the response. Users are strongly recommended to upgrade to version 1.8.2 or apply the patch d41f3697926b231782a3ad8050f5af1ce5cc40b7 (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."