Bug 1743100 (CVE-2019-11776) - CVE-2019-11776 eclipse-birt: report viewer allows reflected XSS in __format url parameter
Summary: CVE-2019-11776 eclipse-birt: report viewer allows reflected XSS in __format u...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-11776
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1743101
TreeView+ depends on / blocked
 
Reported: 2019-08-19 06:02 UTC by Dhananjay Arunesh
Modified: 2021-02-16 21:29 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A reflected cross-site scripting (XSS) vulnerability was found in the Eclipse BIRT Report Viewer. Specifically, the __format parameter is not sufficiently sanitized, allowing JavaScript to be inserted in the URL. A remote attacker can exploit this flaw to execute JavaScript code within the context of the affected user.
Clone Of:
Environment:
Last Closed: 2020-01-31 14:09:31 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-08-19 06:02:33 UTC
A vulnerability was found in Eclipse BIRT versions 1.0 to 4.7, the Report Viewer allows Reflected XSS in URL parameter. Attacker can execute the payload in victim's browser context.

Reference:
https://bugs.eclipse.org/bugs/show_bug.cgi?id=546816

Comment 1 Mauro Matteo Cascella 2020-01-31 10:56:35 UTC
Upstream fix:
https://github.com/eclipse/birt/commit/91ef71824fa33d8fad5da1f7f23791a37f9aa4dc

Comment 2 Mauro Matteo Cascella 2020-01-31 11:31:05 UTC
Statement:

This flaw did not affect the versions of eclipse-birt as shipped with Red Hat Enterprise Linux 6, as they did not include the BIRT Viewer component.

Comment 3 Product Security DevOps Team 2020-01-31 14:09:31 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11776


Note You need to log in before you can comment on or make changes to this bug.