A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:3387 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6818 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-0119 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2159104 | vendor advisory issue tracking |
https://projects.theforeman.org/issues/35977 |