Summary: | CVE-2013-5855 Mojarra JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | David Jorm <djorm> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bdawidow, brms-jira, cdewolf, chazlett, cperry, darran.lofthouse, epp-bugs, fjuma, fnasser, grocha, huwang, jawilson, jbpapp-maint, jcoleman, jdg-bugs, jpallich, juan.hernandez, kejohnso, lgao, mgoldman, mjc, myarboro, pcheung, pgier, pslavice, puntogil, rhq-maint, rsvoboda, soa-p-jira, spinder, ssilvert, theute, tkirby, ttarrant, vtunka, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was found that Mojarra JavaServer Faces did not properly escape user-supplied content in certain circumstances. Contents of outputText tags and raw EL expressions that immediately follow script or style elements were not escaped. A remote attacker could use a specially crafted URL to execute arbitrary web script in the user's browser.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:31:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 1087197, 1087182, 1087184, 1087185, 1087186, 1087187, 1087188, 1087189, 1087191, 1087192, 1087193, 1087194, 1160704, 1166951, 1166952, 1166953, 1166954 | ||
Bug Blocks: | 1065140, 1082938, 1093885, 1097952, 1181883, 1182400, 1182419, 1200191 |
Description
David Jorm
2014-02-14 02:06:55 UTC
Upstream bug: https://java.net/jira/browse/JAVASERVERFACES-3150 Upstream patch commit: https://java.net/projects/mojarra/sources/svn/revision/12793 External References: http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/bc-p/6370209 Created mojarra tracking bugs for this issue: Affects: fedora-all [bug 1087182] This issue has been addressed in following products: JBoss Web Framework Kit 2.6.0 Via RHSA-2014:0896 https://rhn.redhat.com/errata/RHSA-2014-0896.html IssueDescription: It was found that Mojarra JavaServer Faces did not properly escape user-supplied content in certain circumstances. Contents of outputText tags and raw EL expressions that immediately follow script or style elements were not escaped. A remote attacker could use a specially crafted URL to execute arbitrary web script in the user's browser. This issue has been addressed in following products: JBoss Operations Network 3.2.2 Via RHSA-2014:0910 https://rhn.redhat.com/errata/RHSA-2014-0910.html This issue has been addressed in the following products: Red Hat JBoss BRMS 6.0.3 Via RHSA-2015:0235 https://rhn.redhat.com/errata/RHSA-2015-0235.html This issue has been addressed in the following products: Red Hat JBoss BPM Suite 6.0.3 Via RHSA-2015:0234 https://rhn.redhat.com/errata/RHSA-2015-0234.html This issue has been addressed in the following products: JBoss Data Virtualization 6.1.0 Via RHSA-2015:0675 https://rhn.redhat.com/errata/RHSA-2015-0675.html This issue has been addressed in the following products: Red Hat JBoss Fuse Service Works 6.0.0 Via RHSA-2015:0720 https://rhn.redhat.com/errata/RHSA-2015-0720.html This issue has been addressed in the following products: Red Hat JBoss Data Virtualization 6.0.0 Via RHSA-2015:0765 https://rhn.redhat.com/errata/RHSA-2015-0765.html This issue has been addressed in the following products: JBoss Portal 6.2.0 Via RHSA-2015:1009 https://rhn.redhat.com/errata/RHSA-2015-1009.html hi com.sun.faces:jsf-impl:2.5.6, org.glassfish.javax.faces:2.5.6 does not exist, Mojarra/GlassFish JSF latest stable version is 2.3.0-M06 or do you mean another "crap" of fork ...? take a tour in https://svn.java.net/svn/mojarra~svn/tags/ or https://github.com/javaserverfaces/mojarra/tags/ regards for solve this bug is enough 2.1.28 release https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5855 |