Date: Mon, 21 Sep 2015 11:18:33 +0100 From: Dominic Cleal <dominic@...al.org> To: oss-security@...ts.openwall.com Cc: foreman-security@...glegroups.com Subject: CVE-2015-5282: Foreman stored XSS in parameter hide checkbox -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 CVE-2015-5282: Foreman is affected by a stored XSS vulnerability in its parameter key/value web UI. A checkbox exists to hide the values of parameters stored in the application to mask them from casual viewing. When changing the hide/show checkbox, the value is masked/unmasked in the UI, but the parameter value was not properly escaped when updating the UI which allowed stored HTML/JS etc. to be evaluated. Affects: Foreman 1.7.0 or higher Fix to be released in Foreman 1.10.0 Patch: https://github.com/theforeman/foreman/commit/4f3555b217be8723e8045f9816d 147b5f684ec57 More information: http://theforeman.org/security.html#2015-5282 http://projects.theforeman.org/issues/11859 http://theforeman.org/ - -- Dominic Cleal dominic@...al.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlX/2XMACgkQfH0ybywrcsxlNACeJ/9XQm9eMcXf+xw3JFCSf5vY VN0An1WwmASbhE0cci+no2LUO0fIpiOV =V/Ke -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.