Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <566852D1.7000504@cleal.org>
Date: Wed, 9 Dec 2015 16:12:01 +0000
From: Dominic Cleal <dominic@...al.org>
To: oss-security@...ts.openwall.com
Cc: foreman-security@...glegroups.com
Subject: CVE-2015-7518: Foreman stored XSS in parameter information popup

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2015-7518: Foreman is affected by a stored XSS vulnerability in
parameter information popups in the web UI.

Extra information stored on parameters inherited by hosts in Foreman
is shown in the web UI, in a popup for users.  The user-editable parts
of this information, such as a description, matcher and source name
can allow stored HTML/JS to be evaluated when a user opens the
information popup for a parameter.

Thanks to Tomer Brisker for reporting it to the foreman-security team,
and for fixing the issue.

Affects: at least Foreman 1.2.0 and higher (all modern versions)
Fix to be released in Foreman 1.10.0

Patch:
https://github.com/theforeman/foreman/commit/32468bce938067b1bbde1c20257
71b5b83ce88ec

More information:
http://theforeman.org/security.html#2015-7518
http://projects.theforeman.org/issues/12611
http://theforeman.org/

- -- 
Dominic Cleal
dominic@...al.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEYEARECAAYFAlZoUsoACgkQfH0ybywrcszGbACgxVFqMU6/fevuwG8zmxLAHGbU
HzEAn1Rkf4J0rt/GuBGCHC61HX9R+auy
=SfOR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.