Bug 1849206 (CVE-2020-7676) - CVE-2020-7676 nodejs-angular: XSS due to regex-based HTML replacement
Summary: CVE-2020-7676 nodejs-angular: XSS due to regex-based HTML replacement
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-7676
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 1928693 (view as bug list)
Depends On: 1851303 1851304 1851305 1851306 1911821
Blocks: 1849207
TreeView+ depends on / blocked
 
Reported: 2020-06-19 20:23 UTC by Guilherme de Almeida Suckevicz
Modified: 2025-04-28 18:59 UTC (History)
67 users (show)

Fixed In Version: nodejs-angular 1.8.0
Clone Of:
Environment:
Last Closed: 2021-03-23 17:35:28 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:0967 0 None None None 2021-03-23 13:59:39 UTC
Red Hat Product Errata RHSA-2021:0968 0 None None None 2021-03-23 13:58:53 UTC
Red Hat Product Errata RHSA-2021:0969 0 None None None 2021-03-23 14:08:44 UTC
Red Hat Product Errata RHSA-2021:0974 0 None None None 2021-03-23 14:18:19 UTC

Description Guilherme de Almeida Suckevicz 2020-06-19 20:23:17 UTC
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.

Reference:
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058

Upstream commit:
https://github.com/angular/angular.js/pull/17028

Comment 1 Mark Cooper 2020-06-22 06:43:11 UTC
@jshepherd added in quay as it looks like it has angular?
manifest-quay.txt:quay:3.2:quay/yarnpkg-angular-1.6.2.tgz

Comment 2 Mark Cooper 2020-06-24 04:10:51 UTC
External References:

https://snyk.io/vuln/SNYK-JS-ANGULAR-570058

Comment 3 Mark Cooper 2020-06-24 05:15:11 UTC
OpenShift (OCP) 4.x includes a vulnerable version of nodejs-angular in the following containers:
    - openshift4/ose-grafana (v1.6.9)
    - openshift4/ose-logging-kibana5 (v1.6.9)

OpenShift ServiceMesh (OSSM) includes a vulnerable version (v1.6.6) in the openshift-service-mesh/grafana-rhel8 container.

Comment 11 Florencio Cano 2021-02-16 11:06:54 UTC
*** Bug 1928693 has been marked as a duplicate of this bug. ***

Comment 12 errata-xmlrpc 2021-03-23 13:58:54 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 7

Via RHSA-2021:0968 https://access.redhat.com/errata/RHSA-2021:0968

Comment 13 errata-xmlrpc 2021-03-23 13:59:37 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 6

Via RHSA-2021:0967 https://access.redhat.com/errata/RHSA-2021:0967

Comment 14 errata-xmlrpc 2021-03-23 14:08:43 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4 for RHEL 8

Via RHSA-2021:0969 https://access.redhat.com/errata/RHSA-2021:0969

Comment 15 errata-xmlrpc 2021-03-23 14:17:50 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.6

Via RHSA-2021:0974 https://access.redhat.com/errata/RHSA-2021:0974

Comment 16 Product Security DevOps Team 2021-03-23 17:35:28 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-7676


Note You need to log in before you can comment on or make changes to this bug.