Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <cf9fdd28-aba5-f586-01c0-d37beb50008a@apache.org>
Date: Tue, 6 Nov 2018 10:03:50 +0100
From: Francesco Chicchiriccò <ilgrosso@...che.org>
To: dev@...cope.apache.org, "user@...cope.apache.org"
 <user@...cope.apache.org>, announce@...che.org,
 Joan Bono <joanet17@...il.com>, oss-security@...ts.openwall.com,
 "security@...che.org" <security@...che.org>
Subject: [SECURITY] CVE-2018-17184 Apache Syncope

CVE-2018-17184: Stored XSS

Description:
A malicious user with enough administration entitlements can inject
html-like elements containing JavaScript statements into Connector
names, Report names, AnyTypeClass keys and Policy descriptions.
When another user with enough administration entitlements edits one of
the Entities above via Admin Console, the injected JavaScript code is
executed.

Severity: Important

Vendor: The Apache Software Foundation

Affects:
Releases prior to 2.1.2
Releases prior to 2.0.11

Solution:
2.0.X users should upgrade to 2.0.11
2.1.X users should upgrade to 2.1.2

Credit:
This issue was discovered by Kevin Borras Soler.

References:
https://syncope.apache.org/security



Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.