First published: Thu Jan 12 2017(Updated: )
The Gerrit configuration in the Openstack Puppet module for Gerrit (aka puppet-gerrit) improperly marks text/html as a safe mimetype, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a crafted review.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openstack Puppet-gerrit |
https://github.com/openstack-infra/puppet-gerrit/commit/8573c2ee172f66c1667de49685c88fdc8883ca8b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5737 has been classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2016-5737, ensure that text/html is not marked as a safe mimetype in your Gerrit configuration.
CVE-2016-5737 can facilitate cross-site scripting (XSS) attacks via crafted review submissions.
CVE-2016-5737 affects all versions of the Openstack Puppet module for Gerrit.
Organizations using the affected version of the Openstack Puppet module for Gerrit are impacted by CVE-2016-5737.