Project

General

Custom queries

Profile

Actions

Bug #6149

closed

CVE-2014-3492 - XSS in host YAML view

Added by Dominic Cleal almost 11 years ago. Updated almost 7 years ago.

Status:
Closed
Priority:
Urgent
Category:
Security
Target version:
Difficulty:
Triaged:
Fixed in Releases:
Found in Releases:

Description

The host YAML view (preview of YAML data for Puppet) is vulnerable to cross-site scripting attacks, when data relating to the host (such as parameters) contains HTML content.

1. Edit a host, add a parameter with HTML as its name or value
2. View the host, click the YAML button


Files

#1

Updated by Lukas Zapletal almost 11 years ago

  • Status changed from New to Assigned
  • Assignee set to Lukas Zapletal
#3

Updated by Lukas Zapletal almost 11 years ago

  • Status changed from Assigned to Ready For Testing
#4

Updated by Dominic Cleal almost 11 years ago

  • Subject changed from EMBARGOED: XSS in host YAML view to EMBARGOED: CVE-2014-3492 - XSS in host YAML view
#5

Updated by Dominic Cleal almost 11 years ago

  • Status changed from Ready For Testing to Pending
#6

Updated by Dominic Cleal almost 11 years ago

  • Target version changed from 1.8.2 to 1.8.1
#7

Updated by Dominic Cleal almost 11 years ago

  • Translation missing: en.field_release changed from 16 to 19
#8

Updated by Dominic Cleal almost 11 years ago

  • Subject changed from EMBARGOED: CVE-2014-3492 - XSS in host YAML view to CVE-2014-3492 - XSS in host YAML view
  • Description updated (diff)
  • Private changed from Yes to No
#9

Updated by Lukas Zapletal almost 11 years ago

  • Status changed from Pending to Closed
  • % Done changed from 0 to 100
Actions

Also available in: Atom PDF