Bug 1221616 - (CVE-2015-3169) CVE-2015-3169 askbot: cross-site scripting flaw
CVE-2015-3169 askbot: cross-site scripting flaw
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1221619 1221618
  Show dependency treegraph
Reported: 2015-05-14 08:50 EDT by Martin Prpič
Modified: 2016-04-04 12:13 EDT (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
0001-Fix-CVE-2015-3169-XSS-by-using-sort-argument-in-GET-.patch (1.24 KB, text/plain)
2015-06-29 06:33 EDT, Martin Prpič
no flags Details

  None (edit)
Description Martin Prpič 2015-05-14 08:50:55 EDT
A cross-site scripting flaw was found in AskBot, a question and answer forum written in Python and Django.

The flaw can be triggered by appending, for example:


to a question page on a vulnerable AskBot deployment.

This flaw is reported to be fixed in the latest release of AskBot, though it is unclear which one that is. askbot-0.7.51-4.el6.noarch is definitely vulnerable. The upstream changelog is not up-to-date:

Comment 1 Martin Prpič 2015-05-14 08:51:36 EDT
Created askbot tracking bugs for this issue:

Affects: fedora-20 [bug 1221618]
Affects: epel-6 [bug 1221619]
Comment 2 Zoltán Vigh 2015-05-23 11:48:47 EDT
Could you give me more information about the bug? I tested what you wrote but I couldn't trigger it.
Comment 3 Martin Prpič 2015-06-29 05:58:42 EDT

Red Hat would like to thank Harsha Vardhan Boppana (@hvboppana) for reporting this issue.
Comment 4 Martin Prpič 2015-06-29 06:33:12 EDT
Created attachment 1044309 [details]

Note You need to log in before you can comment on or make changes to this bug.