Vulnerability Description
A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Theforeman | Foreman | 1.5.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/93859Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8613Issue TrackingPatchThird Party Advisory
- https://github.com/theforeman/foreman_remote_execution/pull/208Third Party Advisory
- https://projects.theforeman.org/issues/17066/Vendor Advisory
- http://www.securityfocus.com/bid/93859Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8613Issue TrackingPatchThird Party Advisory
- https://github.com/theforeman/foreman_remote_execution/pull/208Third Party Advisory
- https://projects.theforeman.org/issues/17066/Vendor Advisory
FAQ
What is CVE-2016-8613?
CVE-2016-8613 is a vulnerability with a CVSS score of 6.4 (MEDIUM). A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the...
How severe is CVE-2016-8613?
CVE-2016-8613 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-8613?
Check the references section above for vendor advisories and patch information. Affected products include: Theforeman Foreman.