Bug 1710171 (CVE-2019-10146)

Summary: CVE-2019-10146 pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aakkiang, alee, ascheel, carnil, cbuissar, cfu, edewata, gkapoor, jmagne, kwright, mharmsen, rhcs-maint, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A Reflected Cross Site Scripting flaw was found in the pki-ca module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-04 02:21:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1714581, 1714582, 1714583, 1724688, 1724689, 1797761, 1842736, 1926314, 1926315    
Bug Blocks: 1710173    

Description Pedro Sampaio 2019-05-15 03:24:30 UTC
A Reflected Cross Site Scripting flaw was found in the pki-ca module from the pki-core server.

In the /ca/agent/ca/profileProcess form, the basicConstraintsPathLen parameter is not properly sanitized by the server and could allow an attacker to inject a specially crafted value that will be executed on the victim's browser.

Comment 3 msiddiqu 2019-05-28 10:52:06 UTC
Acknowledgments:

Name: Pritam Singh (Red Hat)

Comment 7 Cedric Buissart 2019-05-31 10:08:09 UTC
Statement:

This flaw is considered Low, because it requires the attacker to first request or predict a valid nonce. Without a valid nonce, no arbitrary HTML will be sent back to the victim's browser.

Comment 10 Cedric Buissart 2020-02-03 19:52:31 UTC
Created pki-core tracking bugs for this issue:

Affects: fedora-all [bug 1797761]

Comment 11 Salvatore Bonaccorso 2020-02-07 06:26:53 UTC
Do you know if this was reported upstream and there is an upstream fix?

Comment 12 Cedric Buissart 2020-02-07 14:02:04 UTC
Upstream is aware. There is currently no fix.
However, the security consequences are very limited. 
e.g. : Thanks to the webUI using client side TLS authentication, stealing a cookie will not be of much use to the attacker. 
At the moment, the only concerns are defacing.

If/when there is a fix upstream, it will be posted on this bug tracker.

I hope this helps!

Comment 22 Product Security DevOps Team 2020-11-04 02:21:23 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-10146

Comment 23 errata-xmlrpc 2020-11-04 03:15:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4847 https://access.redhat.com/errata/RHSA-2020:4847

Comment 24 Alex Scheel 2020-12-02 16:36:23 UTC
Actual upstream commit:
https://github.com/dogtagpki/pki/commit/b235c0f3c6c249dbba692410b525d8d6fb7409f4

(Marking comment 21 as private as it contains an incorrect commit -- it was in Dinesh's private fork from which the PR was opened. This commit was the one once merged.)

Comment 25 errata-xmlrpc 2021-03-15 13:25:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.6 Extended Update Support

Via RHSA-2021:0819 https://access.redhat.com/errata/RHSA-2021:0819

Comment 26 errata-xmlrpc 2021-03-16 13:48:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:0851 https://access.redhat.com/errata/RHSA-2021:0851

Comment 27 errata-xmlrpc 2021-03-23 16:46:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Extended Update Support

Via RHSA-2021:0975 https://access.redhat.com/errata/RHSA-2021:0975