First published: Tue Jul 31 2018(Updated: )
A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Theforeman Foreman | =1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in Foreman 1.5.1 is CVE-2016-8613.
The severity level of CVE-2016-8613 is medium with a CVSS score of 6.1.
The vulnerability in Foreman 1.5.1 occurs when the remote execution plugin does not properly escape HTML and JavaScript in console output shown in the web UI.
The affected software version is Foreman 1.5.1.
Yes, there is a fix available for CVE-2016-8613. It is recommended to update to a version that includes the fix.