First published: Tue Nov 15 2011(Updated: )
A cross-site scripting (XSS) flaw was found in the way the commenting system of the ReviewBoard, a web-based code review tool, sanitized user input (new comments to be loaded). A remote attacker could provide a specially-crafted URL, which once visited by valid ReviewBoard user could lead to arbitrary HTML or web script execution in the 'diff viewer' or 'screenshot pages' components. References: [1] <a href="http://www.reviewboard.org/news/">http://www.reviewboard.org/news/</a> [2] <a href="http://www.reviewboard.org/docs/releasenotes/dev/reviewboard/1.6.3/">http://www.reviewboard.org/docs/releasenotes/dev/reviewboard/1.6.3/</a> Relevant upstream patch: [3] <a href="https://github.com/reviewboard/reviewboard/commit/7a0a9d94555502278534dedcf2d75e9fccce8c3d">https://github.com/reviewboard/reviewboard/commit/7a0a9d94555502278534dedcf2d75e9fccce8c3d</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ReviewBoard ReviewBoard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-754126 is considered medium due to the potential for remote exploitation via cross-site scripting.
To fix REDHAT-BUG-754126, ensure that you are using the latest version of ReviewBoard which addresses this XSS vulnerability.
Users of ReviewBoard who utilize the commenting system are affected by REDHAT-BUG-754126.
REDHAT-BUG-754126 is a cross-site scripting (XSS) vulnerability that can allow attackers to inject malicious scripts.
Yes, REDHAT-BUG-754126 can be exploited remotely by attackers through specially-crafted URLs.