Summary
We have discovered a reflection cross site scripting attack that can permit an attacker to hijack a user’s session and inject arbitrary data into the application, including via scripts. The default Content Security Policies provided by Uyuni do not mitigate the exploit examples provided below, and tightening them has been assessed to break WebUI functionality.
Details
This allows exploitation via several different attack vectors, primarily by hijacking the current session of the user or changing the look of the page by changing the HTML on the fly. Our cybersecurity team has assessed this as a “High” vulnerability (scanned with Netsparker).
PoC
These crafted URLs demonstrate the attack vector:
https://<host_name>/rhn/manager/systems/list/all?q=%27%2balert(0x0002C1)%2b%27&qc=%27% 2balert(0x01DEF8)%2b%27
https://<host_name>/rhn/manager/systems/list/all?q=%27%2balert(0x01F137)%2b%27&qc=system_kind
https://<host_name>/rhn/manager/systems/list/all?criteria=%3e0&filter=extra_pkg_count&q=%3E0&qc=%27%2balert(0x04AEC9)%2b%27
https://<host_name>/rhn/manager/systems/list/all?criteria=%3e0&filter=extra_pkg_count&q=%27%2balert(0x04C074)%2b%27&qc=extra_pkg_count
Impact
Possibly intercepting sensitive user data via man-in-the-middle attack, mounting a phishing attack, stealing user information or credentials.
Summary
We have discovered a reflection cross site scripting attack that can permit an attacker to hijack a user’s session and inject arbitrary data into the application, including via scripts. The default Content Security Policies provided by Uyuni do not mitigate the exploit examples provided below, and tightening them has been assessed to break WebUI functionality.
Details
This allows exploitation via several different attack vectors, primarily by hijacking the current session of the user or changing the look of the page by changing the HTML on the fly. Our cybersecurity team has assessed this as a “High” vulnerability (scanned with Netsparker).
PoC
These crafted URLs demonstrate the attack vector:
https://<host_name>/rhn/manager/systems/list/all?q=%27%2balert(0x0002C1)%2b%27&qc=%27% 2balert(0x01DEF8)%2b%27
https://<host_name>/rhn/manager/systems/list/all?q=%27%2balert(0x01F137)%2b%27&qc=system_kind
https://<host_name>/rhn/manager/systems/list/all?criteria=%3e0&filter=extra_pkg_count&q=%3E0&qc=%27%2balert(0x04AEC9)%2b%27
https://<host_name>/rhn/manager/systems/list/all?criteria=%3e0&filter=extra_pkg_count&q=%27%2balert(0x04C074)%2b%27&qc=extra_pkg_count
Impact
Possibly intercepting sensitive user data via man-in-the-middle attack, mounting a phishing attack, stealing user information or credentials.