Bug 2159104 (CVE-2023-0119)

Summary: CVE-2023-0119 Foreman: Stored cross-site scripting in host tab
Product: [Other] Security Response Reporter: ybuenos
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bbuckingham, bcourt, ehelms, jsherril, lzap, mhulan, myarboro, nmoumoul, orabin, pcreech, rchan, security-response-team, ytale
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: foreman 3.5.1.16, foreman 3.5.2, foreman 3.6.0 Doc Type: If docs needed, set a value
Doc Text:
A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-03-21 20:01:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2159667, 2239698    
Bug Blocks: 2154237    

Description ybuenos 2023-01-08 14:32:55 UTC
In section "HOST"->"Create Host", In tab "Additional Information", field "Comment" is vulnerable to stored cross-site scripting. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and get user credentials.

Comment 3 Product Security DevOps Team 2023-03-21 20:01:10 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-0119

Comment 5 errata-xmlrpc 2023-05-31 15:28:18 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.13 for RHEL 8

Via RHSA-2023:3387 https://access.redhat.com/errata/RHSA-2023:3387

Comment 7 errata-xmlrpc 2023-11-08 14:16:58 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.14 for RHEL 8

Via RHSA-2023:6818 https://access.redhat.com/errata/RHSA-2023:6818