It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8639 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2018:0336 | third party advisory vendor advisory |
https://github.com/theforeman/foreman/pull/3523 | third party advisory |
http://www.securityfocus.com/bid/94263 | vdb entry third party advisory |
https://projects.theforeman.org/issues/15037 | vendor advisory |