First published: Fri Jun 28 2013(Updated: )
Multiple cross-site scripting (XSS) flaws were found in the way Red Hat Satellite and Spacewalk services used to sanitize content of various query string (QS) variables when performing search for various entities: * when performing search for software channels value of 'whereCriteria' QS variable was incorrectly sanitized, * when performing search for scap audit results the values of the following QS variables were incorrectly sanitized: 'end_year', 'start_hour', 'end_am_pm', 'end_day', 'end_hour', 'end_minute', 'end_month', 'end_year', 'optionScanDateSearch', 'result_filter', 'search_string', 'show_as', 'start_am_pm', 'start_day', 'start_hour', 'start_minute', 'start_month', 'start_year', and 'whereToSearch', * when performing search for errata the values of the following QS variables were incorrectly sanitized: 'end_minute', 'end_month', 'end_year', 'errata_type_bug', 'errata_type_enhancement', 'errata_type_security', 'fineGrained', 'list_1892635924_sortdir', 'optionIssueDateSearch', 'start_am_pm', 'start_day', 'start_hour', 'start_minute', 'start_month', 'start_year', and 'view_mode', * when performing search for systems the value of the 'fineGrained' QS variable was incorrectly sanitized. Remote attacker could provide a specially-crafted web page that, when visited by authenticated Red Hat Satellite or Spacewalk user would lead to arbitrary HTML or web script execution in the context of Red Hat Satellite's / Spacewalk's user's session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/spacewalk-java-2.0.2-57-sat spacewalk-web-2.0.3-19-sat satellite-branding-5.6.0.23 | <1 | 1 |
Red Hat Satellite | =5.6 | |
Red Hat Satellite | =5.6 | |
Red Hat Spacewalk | <2.0.2 | |
Red Hat Spacewalk | <2.0.3 | |
SUSE Manager Server | =1.7 |
https://git.fedorahosted.org/cgit/spacewalk.git/commit/?id=18c70164285cae0660fa3ac55c6656bb19b3b13f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4415 is classified as a high severity vulnerability due to its potential to allow cross-site scripting attacks.
To fix CVE-2013-4415, update to the latest versions of affected software packages as recommended by Red Hat.
CVE-2013-4415 affects Red Hat Satellite 5.6 and various components of Red Hat Spacewalk, specifically version 5.6 and earlier.
CVE-2013-4415 represents multiple cross-site scripting (XSS) flaws in web applications.
Yes, CVE-2013-4415 is exploitable remotely, allowing attackers to inject malicious scripts through affected query strings.