A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://projects.theforeman.org/issues/17066/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8613 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/93859 | vdb entry third party advisory |
https://github.com/theforeman/foreman_remote_execution/pull/208 | third party advisory |