The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
Acknowledgments: Name: Sanket Jagtap (Red Hat)
Public via: http://projects.theforeman.org/issues/17066/ Proposed patch: https://github.com/theforeman/foreman_remote_execution/pull/208
The patch was accepted upstream, I've filed against Satellite product as https://bugzilla.redhat.com/show_bug.cgi?id=1388202 to match the issue