Headline
CVE-2019-25095: Protect against XSS vulnerabilities in URL redirection by jthiltges · Pull Request #16 · kakwa/ldapcherry
A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
- Switch from base64 to URL encoding for the passing the URL, using the built-in Mako filtering
- Apply HTML filtering to Mako output by default
- Disable HTML filtering for nested templates in adduser, modify, and selfmodify
- Switch from base64 to URL encoding for the passing the URL, using the built-in Mako filtering
- Apply HTML filtering to Mako output by default
- Disable HTML filtering for nested templates in adduser, modify, and selfmodify
Coverage remained the same at ?% when pulling 6f98076 on jthiltges:escape into 1ed654c on kakwa:master.
Copy link
Owner
****kakwa** commented Jan 2, 2019**
Thank you for reporting.
I completely missed this redirect as an untrusted user input. Thank you for the fix.
I do test against a list of “naughty” strings (
def testNaughtyStrings(self):
) but it proved to be not enough.
And thank you for the overall improvements using the mako escaping, this will help greatly to reduce the risk of content injection, adding a layer of protection.
Thanks so much for your help and the prompt merge!
Copy link
Owner
****kakwa** commented Jan 3, 2019**
Copy link
Contributor Author
****jthiltges** commented Jan 3, 2019 •**
I’m updating our install and just noticed an issue with escaping on the selfmodify and modify pages. Sorry about that. I’ll get a new PR opened shortly.
<select class="form-control" id="attr.shell" name="attr.shell">
<option>/bin/bash</option>
<option>/bin/tcsh</option>
</select>
Related news
A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability.