First published: Wed Jun 15 2011(Updated: )
It was found that application for listing of system groups in Red Hat Network Satellite Server and Spacewalk services did not properly HTML escape the content of QueryString. A remote attacker could use this flaw to conduct XSS attacks, potentially leading into attacker's ability to steal the users' session cookie. Acknowledgements: Red Hat would like to thank Daniel Karanja Muturi for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | ||
Spacewalk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-713478 is considered high due to the potential for XSS attacks.
To fix REDHAT-BUG-713478, ensure that the affected application properly HTML escapes QueryString content.
The products affected by REDHAT-BUG-713478 are Red Hat Satellite Server and Red Hat Spacewalk.
Yes, if exploited, REDHAT-BUG-713478 can allow attackers to steal user data through XSS vulnerabilities.
REDHAT-BUG-713478 can enable cross-site scripting (XSS) attacks.