Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-8613

Опубликовано: 31 июл. 2018
Источник: debian
EPSS Низкий

Описание

A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
foremanitppackage

Примечания

  • http://projects.theforeman.org/issues/17066/

  • https://github.com/theforeman/foreman_remote_execution/pull/208

EPSS

Процентиль: 72%
0.00737
Низкий

Связанные уязвимости

CVSS3: 6.4
redhat
больше 9 лет назад

A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

CVSS3: 6.4
nvd
больше 7 лет назад

A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

CVSS3: 6.1
github
больше 3 лет назад

A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

EPSS

Процентиль: 72%
0.00737
Низкий