FIPS 199 Severity Level: Critical
CVSS Score: 9.6 based on
Attack Vector (AV): N
Attack Complexity (AC): L
Privileges Required (PR): N
User Interaction (UI): R
Scope (S): C
Confidentiality (C): H
Integrity (I): H
Availability (A): H
An attacker could inject active code onto the Masking Engine GUI’s Audit page. When a user views the page, the attacker’s code will execute with the permissions of the user viewing the page and therefore can perform any actions allowed by the user’s role (e.g., create a new Masking user, edit a Masking connector, et cetera).
|Major Release||All Sub Releases|
220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168
An attack may also be detected if the Audit GUI is malformatted or contains executable code in the user column. The absence of these anomalies in the GUI is not a guarantee.
At the network layer, IP address whitelisting may be used to limit Delphix appliance access to only approved users.
Customers should upgrade to 22.214.171.124 or later
This issue is resolved in the 126.96.36.199 and 188.8.131.52 releases.
See related XSS vulnerability in TB069 XSS Vulnerability on the Masking Rule Set and Inventory Pages.