Cross-site Scripting (XSS) Affecting foreman-cli package, versions <0:1.15.6.34-1.el7sat


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.08% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL7-FOREMANCLI-4470102
  • published26 Mar 2023
  • disclosed3 Nov 2016

Introduced: 3 Nov 2016

CVE-2016-8634  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade RHEL:7 foreman-cli to version 0:1.15.6.34-1.el7sat or higher.
This issue was patched in RHSA-2018:0336.

NVD Description

Note: Versions mentioned in the description apply only to the upstream foreman-cli package and not the foreman-cli package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL.