
Cloud Vulnerability DB
A community-led vulnerabilities database
Osmedeus, a Workflow Engine for Offensive Security, contains a Cross-site Scripting (XSS) vulnerability that affects its web server when viewing results from the workflow. The vulnerability was discovered in version 4.6.4 and earlier versions, with no patch currently available (GitHub Advisory).
The vulnerability occurs when using a workflow containing the summary module, which generates reports in HTML and Markdown formats based on the general-template.md template. The issue stems from improper filtering of file contents when processing tags through the extendTag function in the markdown processing component. The vulnerability is specifically triggered when content length exceeds the MDCodeBlockLimit configuration (default 10,000 characters) (GitHub Advisory).
A successful exploitation of this vulnerability could allow attackers to execute arbitrary commands on the server through XSS payloads. The vulnerability can be leveraged to perform remote code execution (RCE) by injecting malicious JavaScript code that interacts with the server's API endpoints (GitHub Advisory).
Currently, there is no official patch available for this vulnerability. Users are advised to add their own filtering mechanisms or reach out to the developer to aid in developing a patch (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."