First published: Wed Sep 28 2011(Updated: )
A cross-site scripting (XSS) flaw was found in the way the 'System Details' => 'Details' => 'Custom Info' page of the Red Hat Network Satellite web interface sanitized value (the Description field) of the asset tag / key, assigned to the particular system, created via 'Custom System Info' page. An authenticated Red Hat Network Satellite user could use this flaw to execute arbitrary HTML or web script code via specially-crafted value for the asset 'Custom System Info' key. Acknowledgements: Red Hat would like to thank William Hoffmann for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-742050 is considered medium due to its potential for cross-site scripting attacks.
To fix REDHAT-BUG-742050, ensure you have the latest security updates applied to Red Hat Network Satellite.
REDHAT-BUG-742050 affects certain versions of the Red Hat Network Satellite web interface where custom info sanitization is improperly handled.
REDHAT-BUG-742050 is identified as a cross-site scripting (XSS) vulnerability.
If exploited, REDHAT-BUG-742050 can allow attackers to execute malicious scripts in the context of the affected user's session.