Bug 1358523 (CVE-2016-5398)

Summary: CVE-2016-5398 stored XSS in JBoss BPM suite business process editor
Product: [Other] Security Response Reporter: Pavel Polischouk <pavelp>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: alazarot, etirelli, jcoleman, jechoi, kverlaen, lpetrovi, mbaluch, mwinkler, nwallace, pavelp, rrajasek, rzhang, security-response-team, tkirby
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A security flaw was found in the way Business Process Editor displays the business process details to the user. A remote authenticated attacker with privilege to create business processes could use this flaw to conduct stored XSS attacks against other users.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-18 19:53:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1355940    

Description Pavel Polischouk 2016-07-20 21:56:34 UTC
JBoss BPM Suite 6.3.0 is vulnerable to a stored XSS via business process
editor. Remote authenticated attackers that have privileges to create business processes can store scripts in them, which are not properly sanitized before showing to other users, including admins.

Comment 1 Pavel Polischouk 2016-07-20 21:56:40 UTC
Acknowledgments:

Name: Jeremy Choi (Red Hat Product Security Team)

Comment 5 errata-xmlrpc 2016-09-28 22:32:42 UTC
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite 6.3.3

Via RHSA-2016:1969 https://rhn.redhat.com/errata/RHSA-2016-1969.html

Comment 6 errata-xmlrpc 2016-09-28 22:32:50 UTC
This issue has been addressed in the following products:

  Red Hat JBoss BRMS 6.3.3

Via RHSA-2016:1968 https://rhn.redhat.com/errata/RHSA-2016-1968.html