First published: Tue Mar 19 2013(Updated: )
It was reported that Certificate System suffers from XSS flaws in the /tus/ and /tus/tus/ URLs, such as: GET /tus/tus/%22%2b%61%6c%65%72%74%28%34%38%32%36%37%29%2b%22 or GET /tus/%22%2b%61%6c%65%72%74%28%36%31%34%35%32%29%2b%22 which will in turn output something like: <!-- var uriBase = "/tus/"+alert(85384)+"; var userid = "admin"; This was reported against Certificate System 8.1 and may also affect Dogtag 9 and 10.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-tps | <8.1.5-1.el5 | 8.1.5-1.el5 |
Red Hat Certificate System | =8.1 | |
Dogtag Certificate System | =9.0 | |
Dogtag Certificate System | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1885 has a high severity rating because it exposes users to potential cross-site scripting attacks.
You can mitigate CVE-2013-1885 by upgrading to the patched version of the software, specifically version 8.1.5-1.el5 or newer.
CVE-2013-1885 affects Red Hat Certificate System versions prior to 8.1.5-1.el5 and Dogtag Certificate System versions prior to 10.0.
CVE-2013-1885 allows attackers to execute arbitrary JavaScript in the context of the affected application through XSS.
Yes, XSS vulnerabilities like CVE-2013-1885 are common in web applications due to insufficient input validation.