picketlink is vulnerable to cross-site scripting. A remote attacker is able to inject arbitrary Javascript into a victim’s browser through an SAMLRequest via the RelayState
parameter.
www.securityfocus.com/bid/108732
access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/
access.redhat.com/errata/RHSA-2019:1419
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3872
issues.jboss.org/browse/JBEAP-16124
issues.jboss.org/browse/JBEAP-16139
issues.jboss.org/browse/JBEAP-16360
issues.jboss.org/browse/JBEAP-16362
issues.jboss.org/browse/JBEAP-16370
issues.jboss.org/browse/JBEAP-16453
issues.jboss.org/browse/JBEAP-16457
issues.jboss.org/browse/JBEAP-16470
issues.jboss.org/browse/JBEAP-16471
issues.jboss.org/browse/JBEAP-16473
issues.jboss.org/browse/JBEAP-16580
issues.jboss.org/browse/JBEAP-16622
issues.jboss.org/browse/JBEAP-16632
issues.jboss.org/browse/JBEAP-16633
issues.jboss.org/browse/JBEAP-16670
issues.jboss.org/browse/JBEAP-16709
issues.jboss.org/browse/JBEAP-16717
issues.jboss.org/browse/JBEAP-16720
issues.jboss.org/browse/JBEAP-16781
issues.jboss.org/browse/JBEAP-16860
issues.jboss.org/browse/JBEAP-16881
issues.jboss.org/browse/JBEAP-16882