A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

Project Subscriptions

Vendors Products
Satellite Subscribe
Satellite Capsule Subscribe
Theforeman Subscribe
Foreman Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2016-9459 A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T02:27:40.956Z

Reserved: 2016-10-12T00:00:00.000Z

Link: CVE-2016-8613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-31T20:29:00.277

Modified: 2024-11-21T02:59:40.570

Link: CVE-2016-8613

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-10-24T00:00:00Z

Links: CVE-2016-8613 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses