First published: Wed Jul 09 2008(Updated: )
It was discovered that multiple CGI scripts used by Red Hat / Fedora Directory Server did not properly sanitize %-escaped inputs, resulting in a possibility to conduct cross-site scripting (XSS) attacks. Issue was caused by a flow in an adminutil library that contain common functionality used by multiple CGI scripts, such as affected GET / POST argument parsing. Issue is know to affect some Administration Express scripts and Directory Server Gateway (DSGW) scripts. Affected version: Red Hat Directory Server 7.1 Red Hat Directory Server 8 (flaw limited to Administration Express issues, as DSGW component is not shipped) Fedora Directory Server
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server | ||
Red Hat 389 Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-454621 is classified as a high-risk vulnerability due to the potential for cross-site scripting attacks.
To fix REDHAT-BUG-454621, ensure that your Red Hat Directory Server or Fedora Directory Server is updated to the latest patch version provided by the vendor.
The impact of REDHAT-BUG-454621 allows attackers to potentially execute malicious scripts in the context of an affected user's browser.
Both Red Hat Directory Server and Fedora Directory Server are affected by REDHAT-BUG-454621 across all versions.
There are no specific workarounds for REDHAT-BUG-454621; applying the available security updates is recommended to mitigate the vulnerability.