Created attachment 1787610 [details] Before fix
Created attachment 1787611 [details] After fix
As Eran wrote in https://bugzilla.redhat.com/show_bug.cgi?id=1943388#c17, the vulnerability is not exploitable with provided payload because browsers encode the url. Used payload in browser before the fix can be seen in attachment 1787610 [details]. The url is not rendered in error page anymore after the fix as seen in attachment 1787611 [details]. This prevents attack described in this BZ. --> VERIFIED Tested with: OCS before fix: 4.5.2-146.ci OCS after fix: 4.6.5-411.ci
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2479