Headline
CVE-2013-4415: 979452 – (CVE-2013-4415) CVE-2013-4415 Red Hat Satellite, Spacewalk: PAGE_SIZE_LABEL_SELECTED cross-site scripting (XSS)
Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk and Red Hat Network (RHN) Satellite 5.6 allow remote attackers to inject arbitrary web script or HTML via the (1) whereCriteria variable in a software channels search; (2) end_year, (3) start_hour, (4) end_am_pm, (5) end_day, (6) end_hour, (7) end_minute, (8) end_month, (9) end_year, (10) optionScanDateSearch, (11) result_filter, (12) search_string, (13) show_as, (14) start_am_pm, (15) start_day, (16) start_hour, (17) start_minute, (18) start_month, (19) start_year, or (20) whereToSearch variable in an scap audit results search; (21) end_minute, (22) end_month, (23) end_year, (24) errata_type_bug, (25) errata_type_enhancement, (26) errata_type_security, (27) fineGrained, (28) list_1892635924_sortdir, (29) optionIssueDateSearch, (30) start_am_pm, (31) start_day, (32) start_hour, (33) start_minute, (34) start_month, (35) start_year, or (36) view_mode variable in an errata search; or (37) fineGrained variable in a systems search, related to PAGE_SIZE_LABEL_SELECTED.
Bug 979452 (CVE-2013-4415) - CVE-2013-4415 Red Hat Satellite, Spacewalk: PAGE_SIZE_LABEL_SELECTED cross-site scripting (XSS)
Summary: CVE-2013-4415 Red Hat Satellite, Spacewalk: PAGE_SIZE_LABEL_SELECTED cross-si…
Description Jan Lieskovsky 2013-06-28 15:14:12 UTC
Multiple cross-site scripting (XSS) flaws were found in the way Red Hat Satellite and Spacewalk services used to sanitize content of various query string (QS) variables when performing search for various entities:
* when performing search for software channels value of ‘whereCriteria’ QS variable was incorrectly sanitized,
* when performing search for scap audit results the values of the following QS variables were incorrectly sanitized:
'end\_year', 'start\_hour', 'end\_am\_pm', 'end\_day', 'end\_hour', 'end\_minute', 'end\_month', 'end\_year', 'optionScanDateSearch', 'result\_filter', 'search\_string', 'show\_as', 'start\_am\_pm', 'start\_day', 'start\_hour', 'start\_minute', 'start\_month', 'start\_year', and 'whereToSearch',
* when performing search for errata the values of the following QS variables were incorrectly sanitized:
'end\_minute', 'end\_month', 'end\_year', 'errata\_type\_bug', 'errata\_type\_enhancement', 'errata\_type\_security', 'fineGrained', 'list\_1892635924\_sortdir', 'optionIssueDateSearch', 'start\_am\_pm', 'start\_day', 'start\_hour', 'start\_minute', 'start\_month', 'start\_year', and 'view\_mode',
* when performing search for systems the value of the ‘fineGrained’ QS variable was incorrectly sanitized.
Remote attacker could provide a specially-crafted web page that, when visited by authenticated Red Hat Satellite or Spacewalk user would lead to arbitrary HTML or web script execution in the context of Red Hat Satellite’s / Spacewalk’s user’s session.
Comment 5 Jan Lieskovsky 2013-07-18 14:41:06 UTC
Acknowledgements:
Red Hat would like to thank Adam Willard and Jose Carlos de Arriba of Foreground Security for reporting this issue.
Comment 7 Kurt Seifried 2013-10-10 01:05:16 UTC
The root cause of this issue is within PAGE_SIZE_LABEL_SELECTED.
Comment 14 Grant Gainey 2014-01-24 15:46:13 UTC
commits: fca790234a2d15e7e09875dab5ab5890aba6c593 (majority of the changes) bb9b185143cae97537f0f946bcbfae0252aaf301 (LABEL_SELECTED fix) cafa97d07dd5c0cf6ffda8daa28bcba8e53d6451 (make checkstyle happy) 0d5abafa7732aa74206389c1463888f11282fcf6 (fix satellite-branding)