Bug 770871 (CVE-2011-5025)

Summary: CVE-2011-5025 yaws: Stored and Reflective XSS in Yaws-Wiki
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: lemenkov, lkundrak
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-01-03 04:10:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Kurt Seifried 2011-12-29 21:20:03 UTC
Reference: MISC:https://sitewat.ch/Advisory/View/4

Multiple cross-site scripting (XSS) vulnerabilities in the wiki
application in Yaws 1.88 allow remote attackers to inject arbitrary
web script or HTML via (1) the tag parameter to editTag.yaws, (2) the
index parameter to showOldPage.yaws, (3) the node parameter to
allRefsToMe.yaws, or (4) the text parameter to editPage.yaws.

Comment 1 Huzaifa S. Sidhpurwala 2012-01-03 04:10:18 UTC
This issue does not affects the version of yaws package as shipped with Fedora and EPEL, since we dont ship the wiki component.

Comment 2 Kurt Seifried 2012-01-03 04:37:13 UTC
Wrong yaws (yaws is a minimal web server, yaws-wiki is a wiki).