Multiple cross-site scripting (XSS) flaws were found in the way Red Hat Satellite and Spacewalk services used to sanitize content of various query string (QS) variables when performing search for various entities:
* when performing search for software channels value of 'whereCriteria' QS variable was incorrectly sanitized,
* when performing search for scap audit results the values of the following QS variables were incorrectly sanitized:
'end_year', 'start_hour', 'end_am_pm', 'end_day', 'end_hour', 'end_minute', 'end_month', 'end_year', 'optionScanDateSearch', 'result_filter', 'search_string', 'show_as', 'start_am_pm', 'start_day', 'start_hour', 'start_minute', 'start_month', 'start_year', and 'whereToSearch',
* when performing search for errata the values of the following QS variables were incorrectly sanitized:
'end_minute', 'end_month', 'end_year', 'errata_type_bug', 'errata_type_enhancement', 'errata_type_security', 'fineGrained', 'list_1892635924_sortdir', 'optionIssueDateSearch', 'start_am_pm', 'start_day', 'start_hour', 'start_minute', 'start_month', 'start_year', and 'view_mode',
* when performing search for systems the value of the 'fineGrained' QS variable was incorrectly sanitized.
Remote attacker could provide a specially-crafted web page that, when visited by authenticated Red Hat Satellite or Spacewalk user would lead to arbitrary HTML or web script execution in the context of Red Hat Satellite's / Spacewalk's user's session.