Bug 1668089 (CVE-2018-20677)

Summary: CVE-2018-20677 bootstrap: XSS in the affix configuration target property
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abergmann, abokovoy, aileenc, alazarot, amctagga, anstephe, aoconnor, apevec, asoldano, aturgema, bbaranow, bbuckingham, bcourt, bdettelb, bkearney, bmaxwell, bniver, brian.stansberry, cdewolf, chazlett, cheimes, dajohnso, darran.lofthouse, dbecker, dblechte, dfediuck, dkreling, dmetzger, dmoppert, dosoudil, drieden, eedri, eglynn, ehelms, etirelli, fjuma, flucifre, frenaud, gblomqui, gmalinko, gmccullo, gmeno, gtanzill, ibek, idm-ds-dev-bugs, ivassile, iweiss, janstey, jfrey, jhardy, jjoyce, jkozol, jpavlik, jprause, jschluet, jsherril, jwendell, kbasil, kdixon, krathod, kverlaen, lgao, lhh, lpeer, lpetrovi, lzap, mbenjamin, mburns, meissner, mgarciac, mgoldboi, mhackett, mhulan, michal.skrivanek, mkosek, mosmerov, mperina, mpitt, msochure, msvehla, muagarwa, myarboro, nmoumoul, nwallace, obarenbo, ocs-bugs, omachace, omajid, orabin, paradhya, pcreech, pdelbell, pdrozd, pjindal, pmackay, rcernich, rchan, rcritten, rhcs-maint, rhos-maint, rhos-maint, roliveri, rrajasek, rstancel, rsynek, rzhang, sbonazzo, sclewis, sdaley, sgratch, sherold, simaishi, slinaber, smaestri, sostapov, spower, sthorger, tlestach, tom.jenkinson, tscherf, twalsh, twoerner, vereddy, yturgema
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: bootstrap 3.4.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Bootstrap, where it is vulnerable to Cross-site scripting caused by improper validation of user-supplied input by the affix configuration target property. This flaw allows a remote attacker to execute a script in a victim's Web browser within the security context of the hosting Web site, which can lead to stealing the victim's cookie-based authentication credentials.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-12 13:06:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1668090, 1668093, 2183412, 1668091, 1668092, 1673130, 1673131, 1673132, 1673133, 1673134, 1673210, 1740983, 1811966, 1811967, 2183413, 2183414, 2183415    
Bug Blocks: 1668094    

Comment 13 errata-xmlrpc 2019-06-11 15:32:25 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.3.2 zip

Via RHSA-2019:1456 https://access.redhat.com/errata/RHSA-2019:1456

Comment 14 Product Security DevOps Team 2019-07-12 13:06:34 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-20677

Comment 15 Doran Moppert 2019-08-14 04:12:07 UTC
This vulnerability was addressed Red Hat Virtualization 4.3 package ovirt-engine-api-explorer via https://access.redhat.com/errata/RHBA-2019:1570

Comment 16 Doran Moppert 2019-08-14 04:12:14 UTC
Statement:

Red Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don't use the vulnerable component at all.

Red Hat Virtualization 4.2 EUS contains the affected version of bootstrap in the packages ovirt-js-dependencies and ovirt-engine-dashboard. These packages are deprecated in Red Hat Virtualization 4.3.

Comment 17 errata-xmlrpc 2019-10-10 15:38:43 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization Engine 4.3

Via RHSA-2019:3023 https://access.redhat.com/errata/RHSA-2019:3023

Comment 19 errata-xmlrpc 2020-01-16 16:02:20 UTC
This issue has been addressed in the following products:

  Red Hat Process Automation

Via RHSA-2020:0132 https://access.redhat.com/errata/RHSA-2020:0132

Comment 20 errata-xmlrpc 2020-01-16 16:02:57 UTC
This issue has been addressed in the following products:

  Red Hat Decision Manager

Via RHSA-2020:0133 https://access.redhat.com/errata/RHSA-2020:0133

Comment 22 errata-xmlrpc 2020-09-29 19:57:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:3936 https://access.redhat.com/errata/RHSA-2020:3936

Comment 23 errata-xmlrpc 2020-11-04 02:49:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4670 https://access.redhat.com/errata/RHSA-2020:4670

Comment 26 errata-xmlrpc 2020-12-16 13:51:46 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 13.0 (Queens)
  Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS

Via RHSA-2020:5571 https://access.redhat.com/errata/RHSA-2020:5571

Comment 28 Chess Hazlett 2023-03-31 20:00:11 UTC
Fuse-7 is in maintenance and JDG-7 is in ELS-1. Both are OOSS.

Comment 29 errata-xmlrpc 2023-10-12 16:34:22 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 6.1

Via RHSA-2023:5693 https://access.redhat.com/errata/RHSA-2023:5693