Bug 1849206 (CVE-2020-7676)

Summary: CVE-2020-7676 nodejs-angular: XSS due to regex-based HTML replacement
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aboyko, aileenc, alazarot, alegrand, anpicker, anstephe, aos-bugs, ataylor, bdettelb, bmontgom, boliveir, chazlett, dhanak, doconnor, drichtar, drieden, ecerquei, emingora, eparis, erooth, etirelli, ggaughan, gmalinko, hvyas, ibek, janstey, jburrell, jcantril, jkoops, jochrist, jokerman, jrokos, jross, jstastny, jwendell, jwon, kakkoyun, kconner, krathod, kverlaen, lcosic, mkaplan, mnovotny, nstielau, osoukup, pdelbell, pdrozd, peholase, pesilva, pjindal, pkrupa, porcelli, pskopek, puebele, rcernich, rguimara, rkieley, rmartinc, rowaters, rrajasek, rstepani, sponnaga, sthorger, surbania, teagle, tomckay, tzimanyi
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: nodejs-angular 1.8.0 Doc Type: If docs needed, set a value
Doc Text:
A XSS flaw was found in nodejs-angular. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "\<option\>" elements in "\<select\>" ones changes parsing behavior, leading to possibly unsanitizing code.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-03-23 17:35:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1851303, 1851304, 1851305, 1851306, 1911821    
Bug Blocks: 1849207    

Description Guilherme de Almeida Suckevicz 2020-06-19 20:23:17 UTC
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.

Reference:
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058

Upstream commit:
https://github.com/angular/angular.js/pull/17028

Comment 1 Mark Cooper 2020-06-22 06:43:11 UTC
@jshepherd added in quay as it looks like it has angular?
manifest-quay.txt:quay:3.2:quay/yarnpkg-angular-1.6.2.tgz

Comment 2 Mark Cooper 2020-06-24 04:10:51 UTC
External References:

https://snyk.io/vuln/SNYK-JS-ANGULAR-570058

Comment 3 Mark Cooper 2020-06-24 05:15:11 UTC
OpenShift (OCP) 4.x includes a vulnerable version of nodejs-angular in the following containers:
    - openshift4/ose-grafana (v1.6.9)
    - openshift4/ose-logging-kibana5 (v1.6.9)

OpenShift ServiceMesh (OSSM) includes a vulnerable version (v1.6.6) in the openshift-service-mesh/grafana-rhel8 container.

Comment 11 Florencio Cano 2021-02-16 11:06:54 UTC
*** Bug 1928693 has been marked as a duplicate of this bug. ***

Comment 12 errata-xmlrpc 2021-03-23 13:58:54 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 7

Via RHSA-2021:0968 https://access.redhat.com/errata/RHSA-2021:0968

Comment 13 errata-xmlrpc 2021-03-23 13:59:37 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 6

Via RHSA-2021:0967 https://access.redhat.com/errata/RHSA-2021:0967

Comment 14 errata-xmlrpc 2021-03-23 14:08:43 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 8

Via RHSA-2021:0969 https://access.redhat.com/errata/RHSA-2021:0969

Comment 15 errata-xmlrpc 2021-03-23 14:17:50 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.6

Via RHSA-2021:0974 https://access.redhat.com/errata/RHSA-2021:0974

Comment 16 Product Security DevOps Team 2021-03-23 17:35:28 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-7676