Bug 1777579 (CVE-2020-1721)
| Summary: | CVE-2020-1721 pki-core: KRA vulnerable to reflected XSS via the getPk12 page | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | alee, ascheel, carnil, cbuissar, edewata, jmagne, kwright, mharmsen, nsl, prisingh, rhcs-maint, security-response-team |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | pki-core 10.10.5 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in the Key Recovery Authority (KRA) Agent Service where it did not properly sanitize the recovery ID during a key recovery request, enabling a Reflected Cross-Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-11-04 02:23:34 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1798010, 1798011, 1798012, 1926322, 1926324 | ||
| Bug Blocks: | 1777580, 1936790 | ||
|
Description
Pedro Sampaio
2019-11-27 21:16:47 UTC
Acknowledgments: Name: Pritam Singh (Red Hat) Statement: This vulnerability is rated Low : the web UI uses client TLS authentication, therefore stealing session cookies will not be sufficient for unauthorized access. The vulnerable page itself does not contain secrets. Do you know if this was reported in the upstream issue tracker and there is a fix? (In reply to Salvatore Bonaccorso from comment #6) > Do you know if this was reported in the upstream issue tracker and there is > a fix? Hi Cedric, can you help with this? Pedro, Salvatore, Upstream Dogtag developer here. There is currently no upstream tracker. When one is created, I'll post it here. Thanks, Alex Any update on this one? I haven't seen it upstream or NVD. (In reply to Nicholas Luedtke from comment #12) > Any update on this one? I haven't seen it upstream or NVD. The upstream fix has been pushed : https://github.com/dogtagpki/pki/commit/b3514113c867c9394dd84e313c55dc66f3e846b6 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-1721 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4847 https://access.redhat.com/errata/RHSA-2020:4847 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2021:0819 https://access.redhat.com/errata/RHSA-2021:0819 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:0851 https://access.redhat.com/errata/RHSA-2021:0851 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:0975 https://access.redhat.com/errata/RHSA-2021:0975 |