Red Hat Bugzilla – Bug 1144211
CVE-2014-3649 JBoss AeroGear: reflected XSS via password field of the login page
Last modified: 2015-03-06 19:43:24 EST
The password field accepts HTML content. When two-factor authentication is enabled, the password field is reflected back to the user when they are prompted for the "one-time-password" and it is rendered as HTML. This vector can be used for a "drive-by" attack. By having a victim visit an attacker controlled page while logged in, the attacker can force them to issue a second login request containing a prepared password. When that password--containing a malicious payload--is reflected back to them as HTML, the attacker can gain control of the victim's session.
Upstream Issue: https://issues.jboss.org/browse/AEROGEAR-1514
Statement: Not Vulnerable. Aerogear is not provided by any Red Hat product.