First published: Fri Oct 23 2020(Updated: )
A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-core | <0:10.5.18-12.el7_9 | 0:10.5.18-12.el7_9 |
redhat/pki-core | <0:10.5.9-15.el7_6 | 0:10.5.9-15.el7_6 |
redhat/pki-core | <0:10.5.16-7.el7_7 | 0:10.5.16-7.el7_7 |
Dogtagpki Dogtagpki | =10.9.0 | |
redhat/pki-core | <10.9.0 | 10.9.0 |
Because the cross-site scripting (XSS) attack requires the victim to have their RHCS certificate installed in their web browser to be successful, it is recommended that web browser not hold the keys and that the user use the command line interface (CLI) instead.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2020-25715.
The severity level of CVE-2020-25715 is medium.
The vulnerability allows a specially crafted POST request to reflect a DOM-based cross-site scripting (XSS) attack, which can inject code into the search query form and potentially compromise data integrity.
pki-core version 10.9.0 is affected by CVE-2020-25715.
You can find more information about CVE-2020-25715 at the following references: - [CVE-2020-25715 on CVE.org](https://www.cve.org/CVERecord?id=CVE-2020-25715) - [CVE-2020-25715 on NIST NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-25715) - [Bugzilla Red Hat Bug](https://bugzilla.redhat.com/show_bug.cgi?id=1891016) - [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:0851)