Description
The web application uses SAML. The web application's SAML Consumer Service is vulnerable to XSS due to lack of sanitization of values from SAMLResponse.
An unauthenticated attacker may be able to use it to attack other users.
Remediation
Apply context-dependent sanitization to SAMLResponse values rendered on a page
References
Related Vulnerabilities
WordPress Plugin PopCash.Net Code Integration Tool Cross-Site Scripting (1.0)
WordPress 4.1.x Cross-Site Scripting Vulnerability (4.1 - 4.1.8)
Joomla! Core 3.2.x Cross-Site Scripting (3.2.0 - 3.2.4)
WordPress Plugin VDZ VERIFICATION (Custom Meta Tags) Cross-Site Scripting (1.3.12)
WordPress Plugin UserPro-Community and User Profile Cross-Site Scripting (4.9.33)