Bug 1387232 (CVE-2016-8613)

Summary: CVE-2016-8613 foreman: Stored XSS vulnerability in remote execution plugin
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bkearney, cbillett, inecas, jmatthew, mmccune, ohadlevy, security-response-team, sjagtap, tlestach, tsanders
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-21 00:55:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1388202, 1399326    
Bug Blocks: 1387235, 1432306    

Description Andrej Nemec 2016-10-20 12:14:28 UTC
The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

Comment 1 Andrej Nemec 2016-10-20 12:14:39 UTC
Acknowledgments:

Name: Sanket Jagtap (Red Hat)

Comment 3 Ivan Necas 2016-10-24 18:03:10 UTC
The patch was accepted upstream, I've filed against Satellite product as https://bugzilla.redhat.com/show_bug.cgi?id=1388202 to match the issue