Bug 1524949 (CVE-2017-11507)
| Summary: | CVE-2017-11507 check-mk: Stored XSS vulnerability using the internal server error handler | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | andrea.veri, sisharma, smohan, ssaha, vbellur |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | check-mk 1.2.8p25, check-mk 1.4.0p9, check-mk 1.5.0i1 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-12-14 04:47:17 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1524950 | ||
|
Description
Adam Mariš
2017-12-12 10:51:42 UTC
We're shipping 1.2.8p26 already on all the supported channels. Is this report still relevant? Analysis: As per report attack vector is http://[target]/[sitename]/check_mk/login.py?output_format=<script>alert(%27XSS%27)</script>. check_mk/login.py is part of check-mk-multisite rpm, this rpm is not shipped with Red Hat Gluster Storage 3. Statement: Red Hat Gluster Storage 3 does not ship check-mk-multisite rpm, and is therefore not affected by this flaw. (In reply to Andrea Veri from comment #1) > We're shipping 1.2.8p26 already on all the supported channels. Is this > report still relevant? I know, therefore Fedora is marked as not affected. No action is needed, thanks for checking though! |