First published: Tue Mar 19 2013(Updated: )
It was reported that Certificate System suffers from XSS flaws in the /tus/ and /tus/tus/ URLs, such as: GET /tus/tus/%22%2b%61%6c%65%72%74%28%34%38%32%36%37%29%2b%22 or GET /tus/%22%2b%61%6c%65%72%74%28%36%31%34%35%32%29%2b%22 which will in turn output something like: <!-- var uriBase = "/tus/"+alert(85384)+"; var userid = "admin"; This was reported against Certificate System 8.1 and may also affect Dogtag 9 and 10.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Certificate System | =8.1 | |
Redhat Dogtag Certificate System | =9.0 | |
Redhat Dogtag Certificate System | =10.0 | |
redhat/pki-tps | <8.1.5-1.el5 | 8.1.5-1.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.