angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code. Reference: https://snyk.io/vuln/SNYK-JS-ANGULAR-570058 Upstream commit: https://github.com/angular/angular.js/pull/17028
@jshepherd added in quay as it looks like it has angular? manifest-quay.txt:quay:3.2:quay/yarnpkg-angular-1.6.2.tgz
External References: https://snyk.io/vuln/SNYK-JS-ANGULAR-570058
OpenShift (OCP) 4.x includes a vulnerable version of nodejs-angular in the following containers: - openshift4/ose-grafana (v1.6.9) - openshift4/ose-logging-kibana5 (v1.6.9) OpenShift ServiceMesh (OSSM) includes a vulnerable version (v1.6.6) in the openshift-service-mesh/grafana-rhel8 container.
*** Bug 1928693 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Single Sign-On 7.4 for RHEL 7 Via RHSA-2021:0968 https://access.redhat.com/errata/RHSA-2021:0968
This issue has been addressed in the following products: Red Hat Single Sign-On 7.4 for RHEL 6 Via RHSA-2021:0967 https://access.redhat.com/errata/RHSA-2021:0967
This issue has been addressed in the following products: Red Hat Single Sign-On 7.4 for RHEL 8 Via RHSA-2021:0969 https://access.redhat.com/errata/RHSA-2021:0969
This issue has been addressed in the following products: Red Hat Single Sign-On 7.4.6 Via RHSA-2021:0974 https://access.redhat.com/errata/RHSA-2021:0974
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-7676