Bug 1950915

Summary: XSS Vulnerability with Noobaa version 5.5.0-3bacc6b
Product: [Red Hat Storage] Red Hat OpenShift Container Storage Reporter: Nimrod Becker <nbecker>
Component: Multi-Cloud Object GatewayAssignee: Nimrod Becker <nbecker>
Status: CLOSED ERRATA QA Contact: Filip Balák <fbalak>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.6CC: bkunal, ebenahar, etamir, kelwhite, lmauda, muagarwa, nbecker, ocs-bugs, ratamir
Target Milestone: ---Keywords: FutureFeature, ZStream
Target Release: OCS 4.6.5   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: 4.6.5-411.ci Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: 1943388 Environment:
Last Closed: 2021-06-17 15:46:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1943388    
Bug Blocks: 1950906    
Attachments:
Description Flags
Before fix
none
After fix none

Comment 10 Filip Balák 2021-05-27 12:23:52 UTC
Created attachment 1787610 [details]
Before fix

Comment 11 Filip Balák 2021-05-27 12:24:57 UTC
Created attachment 1787611 [details]
After fix

Comment 12 Filip Balák 2021-05-27 12:40:55 UTC
As Eran wrote in https://bugzilla.redhat.com/show_bug.cgi?id=1943388#c17, the vulnerability is not exploitable with provided payload because browsers encode the url. Used payload in browser before the fix can be seen in attachment 1787610 [details].

The url is not rendered in error page anymore after the fix as seen in attachment 1787611 [details]. This prevents attack described in this BZ. --> VERIFIED

Tested with:
OCS before fix: 4.5.2-146.ci
OCS after fix: 4.6.5-411.ci

Comment 19 errata-xmlrpc 2021-06-17 15:46:42 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:2479