A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93859 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8613 | Issue Tracking Patch Third Party Advisory |
https://github.com/theforeman/foreman_remote_execution/pull/208 | Third Party Advisory |
https://projects.theforeman.org/issues/17066/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-07-31T20:00:00
Updated: 2018-08-01T09:57:01
Reserved: 2016-10-12T00:00:00
Link: CVE-2016-8613
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-31T20:29:00.277
Modified: 2023-02-12T23:26:11.620
Link: CVE-2016-8613
JSON object: View
Redhat Information
No data.
CWE