Bug #25275
openStored XSS In job invocation page
Description
rpm -qa | grep remote
tfm-rubygem-foreman_remote_execution-1.5.6-3.el7sat.noarch
tfm-rubygem-hammer_cli_foreman_remote_execution-0.1.0-1.el7sat.noarch
rubygem-smart_proxy_remote_execution_ssh-0.2.0-3.el7sat.noarch
tfm-rubygem-foreman_remote_execution_core-1.1.3-1.el7sat.noarch
Steps:
1. Create a new Job Template https://sat-host/job_templates or clone a template
2. Edit the cloned template and Navigate to Jobs tab
3. Create a User Input with description as <svg/onload=alert('XSS')>
4. Run the template
5. Go to the Custom Field you created and click to get the description toast message
The Script is Executed.
Also , reproducible in Current stable nightly,
foreman-release-1.21.0-0.1.develop.el7.noarch
foreman-selinux-1.21.0-0.201810181136gitcedb6210.1.develop.el7.noarch
foreman-installer-1.21.0-0.201810190326gitf8d45fb0.1.develop.el7.noarch
In current upstream nightly, the above step is slightly changed and we have a separate template Input tab. But, it is still vulnerable
Files