Bug 1051551
Summary: | piranha: multiple stored XSS issues | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Othman Madjoudj <athmanem> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED WONTFIX | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | bperkins, cluster-maint, jrusnack, rohara, vkrizan | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2015-10-27 21:55:48 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1275699 | ||||||
Bug Blocks: | 1062151 | ||||||
Attachments: |
|
Description
Othman Madjoudj
2014-01-10 14:52:31 UTC
Created attachment 848233 [details]
A screenshot of one of the issues
(In reply to Athmane Madjoudj from comment #0) > which leads to Cross Site Scripting vulnerabilities, some of them are > reflected (low impact) Your report do not seem to specify any reflected XSS, only 3 stored XSS are listed. > and some are persistent/stored (high impact) in the configuration file > '/etc/sysconfig/ha/lvs.cf' That's correct, input from lvs.cf are not encoded properly before being added to the output of the web application. However, I disagree with the high impact rating. For the application, lvs.cf is really a trusted input for the application. Also privileges to edit the file via the web application are administrative privileges, which make this more of a bug than a real security issue. (In reply to Tomas Hoger from comment #2) > (In reply to Athmane Madjoudj from comment #0) > > which leads to Cross Site Scripting vulnerabilities, some of them are > > reflected (low impact) > > Your report do not seem to specify any reflected XSS, only 3 stored XSS are > listed. > I didn't have time to check everything, so I could be wrong about reflected XSS. > > and some are persistent/stored (high impact) in the configuration file > > '/etc/sysconfig/ha/lvs.cf' > > That's correct, input from lvs.cf are not encoded properly before being > added to the output of the web application. However, I disagree with the > high impact rating. For the application, lvs.cf is really a trusted input > for the application. Also privileges to edit the file via the web > application are administrative privileges, which make this more of a bug > than a real security issue. True |