A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
References
Link | Resource |
---|---|
https://projects.theforeman.org/issues/17066/ | Vendor Advisory |
https://github.com/theforeman/foreman_remote_execution/pull/208 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8613 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/93859 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-07-31 13:29
Updated : 2023-02-12 15:26
NVD link : CVE-2016-8613
Mitre link : CVE-2016-8613
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
theforeman
- foreman