CVE Vulnerabilities

CVE-2013-4492

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Published: Dec 07, 2013 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM

Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.

Weakness

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Affected Software

Name Vendor Start Version End Version
I18n I18n_project * 0.6.5 (including)
CloudForms Management Engine 5.4 RedHat cfme-0:5.4.0.5-1.el6cf *
CloudForms Management Engine 5.4 RedHat cfme-gemset-0:5.4.0.5-1.el6cf *
CloudForms Management Engine 5.4 RedHat cfme-vnc-plugin-0:1.0.0-2.el6cf *
CloudForms Management Engine 5.4 RedHat libdnet-0:1.12-11.el6cf *
CloudForms Management Engine 5.4 RedHat lshw-0:B.02.16-4.el6cf *
CloudForms Management Engine 5.4 RedHat netapp-manageability-sdk-0:4.0P1-3.el6cf *
CloudForms Management Engine 5.4 RedHat open-vm-tools-0:9.2.3-5.el6cf *
CloudForms Management Engine 5.4 RedHat prince-0:9.0r2-4.el6cf *
CloudForms Management Engine 5.4 RedHat pyliblzma-0:0.5.3-7.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-ffi-0:1.9.8-1.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-io-extra-0:1.2.8-1.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-json-0:1.8.2-2.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-pg-0:0.12.2-9.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-psych-0:2.0.13-1.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf *
CloudForms Management Engine 5.4 RedHat ruby200-rubygem-thin-0:1.3.1-9.el6cf *
CloudForms Management Engine 5.4 RedHat sneakernet_ca-0:0.1-2.el6cf *
CloudForms Management Engine 5.4 RedHat wmi-0:1.3.14-1.el6cf *
CloudForms Management Engine 5.7 RedHat cfme-0:5.7.1.3-1.el7cf *
CloudForms Management Engine 5.7 RedHat cfme-appliance-0:5.7.1.3-1.el7cf *
CloudForms Management Engine 5.7 RedHat cfme-gemset-0:5.7.1.3-1.el7cf *
CloudForms Management Engine 5.9 RedHat ansible-0:2.4.3.0-1.el7ae *
CloudForms Management Engine 5.9 RedHat ansible-tower-0:3.1.5-3.el7at *
CloudForms Management Engine 5.9 RedHat bubblewrap-0:0.1.7-1.el7 *
CloudForms Management Engine 5.9 RedHat cfme-0:5.9.0.22-1.el7cf *
CloudForms Management Engine 5.9 RedHat cfme-amazon-smartstate-0:5.9.0.22-1.el7cf *
CloudForms Management Engine 5.9 RedHat cfme-appliance-0:5.9.0.22-1.el7cf *
CloudForms Management Engine 5.9 RedHat cfme-gemset-0:5.9.0.22-1.el7cf *
CloudForms Management Engine 5.9 RedHat dbus-api-service-0:1.0.1-2.el7cf *
CloudForms Management Engine 5.9 RedHat dumb-init-0:1.2.0-1.el7 *
CloudForms Management Engine 5.9 RedHat erlang-0:19.0.4-1.el7at *
CloudForms Management Engine 5.9 RedHat freeipmi-0:1.5.1-2.el7cf *
CloudForms Management Engine 5.9 RedHat google-compute-engine-0:2.0.0-1.el7cf *
CloudForms Management Engine 5.9 RedHat google-config-0:2.0.0-1.el7cf *
CloudForms Management Engine 5.9 RedHat httpd-configmap-generator-0:0.2.1-1.el7cf *
CloudForms Management Engine 5.9 RedHat nginx-1:1.10.2-1.el7at *
CloudForms Management Engine 5.9 RedHat postgresql94-0:9.4.15-3PGDG.el7at *
CloudForms Management Engine 5.9 RedHat prince-0:9.0r2-10.el7cf *
CloudForms Management Engine 5.9 RedHat python-crypto-0:2.6.1-16.el7at *
CloudForms Management Engine 5.9 RedHat python-jmespath-0:0.9.0-4.el7ae *
CloudForms Management Engine 5.9 RedHat python-meld3-0:0.6.10-1.el7 *
CloudForms Management Engine 5.9 RedHat python-paramiko-0:2.1.1-2.el7ae *
CloudForms Management Engine 5.9 RedHat qpid-proton-0:0.19.0-1.el7cf *
CloudForms Management Engine 5.9 RedHat rabbitmq-server-0:3.6.9-1.el7at *
CloudForms Management Engine 5.9 RedHat rh-postgresql95-postgresql-pglogical-0:2.1.0-2.el7cf *
CloudForms Management Engine 5.9 RedHat rh-postgresql95-repmgr-0:3.1.3-2.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-bcrypt-0:3.1.11-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-ffi-0:1.9.18-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-hamlit-0:2.7.5-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-http_parser.rb-0:0.6.0-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-json-0:2.0.4-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-linux_block_device-0:0.2.1-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-memory_buffer-0:0.1.0-2.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-nio4r-0:2.1.0-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-nokogiri-0:1.8.1-2.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-ovirt-engine-sdk4-0:4.2.1-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-pg-0:0.18.4-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-puma-0:3.7.1-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-qpid_proton-0:0.19.0-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-redhat_access_cfme-0:2.0.2-2.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-redhat_access_lib-0:1.1.4-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-rugged-0:0.25.1.1-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-sqlite3-0:1.3.13-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-unf_ext-0:0.0.7.4-1.el7cf *
CloudForms Management Engine 5.9 RedHat rh-ruby23-rubygem-websocket-driver-0:0.6.5-1.el7cf *
CloudForms Management Engine 5.9 RedHat smem-0:1.4-1.el7cf *
CloudForms Management Engine 5.9 RedHat supervisor-0:3.1.4-1.el7 *
CloudForms Management Engine 5.9 RedHat wmi-0:1.3.14-7.el7cf *
Ruby-i18n Ubuntu artful *
Ruby-i18n Ubuntu bionic *
Ruby-i18n Ubuntu cosmic *
Ruby-i18n Ubuntu devel *
Ruby-i18n Ubuntu disco *
Ruby-i18n Ubuntu eoan *
Ruby-i18n Ubuntu esm-apps/bionic *
Ruby-i18n Ubuntu esm-apps/focal *
Ruby-i18n Ubuntu esm-apps/jammy *
Ruby-i18n Ubuntu esm-apps/noble *
Ruby-i18n Ubuntu esm-apps/xenial *
Ruby-i18n Ubuntu focal *
Ruby-i18n Ubuntu groovy *
Ruby-i18n Ubuntu hirsute *
Ruby-i18n Ubuntu impish *
Ruby-i18n Ubuntu jammy *
Ruby-i18n Ubuntu kinetic *
Ruby-i18n Ubuntu lunar *
Ruby-i18n Ubuntu mantic *
Ruby-i18n Ubuntu noble *
Ruby-i18n Ubuntu oracular *
Ruby-i18n Ubuntu precise *
Ruby-i18n Ubuntu quantal *
Ruby-i18n Ubuntu raring *
Ruby-i18n Ubuntu saucy *
Ruby-i18n Ubuntu trusty *
Ruby-i18n Ubuntu trusty/esm *
Ruby-i18n Ubuntu utopic *
Ruby-i18n Ubuntu vivid *
Ruby-i18n Ubuntu wily *
Ruby-i18n Ubuntu xenial *
Ruby-i18n Ubuntu yakkety *
Ruby-i18n Ubuntu zesty *

Extended Description

Cross-site scripting (XSS) vulnerabilities occur when:

There are three main kinds of XSS:

Once the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim’s machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site. Phishing attacks could be used to emulate trusted web sites and trick the victim into entering a password, allowing the attacker to compromise the victim’s account on that web site. Finally, the script could exploit a vulnerability in the web browser itself possibly taking over the victim’s machine, sometimes referred to as “drive-by hacking.” In many cases, the attack can be launched without the victim even being aware of it. Even with careful users, attackers frequently use a variety of methods to encode the malicious portion of the attack, such as URL encoding or Unicode, so the request looks less suspicious.

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Examples of libraries and frameworks that make it easier to generate properly encoded output include Microsoft’s Anti-XSS library, the OWASP ESAPI Encoding module, and Apache Wicket.

  • Understand the context in which your data will be used and the encoding that will be expected. This is especially important when transmitting data between different components, or when generating outputs that can contain multiple encodings at the same time, such as web pages or multi-part mail messages. Study all expected communication protocols and data representations to determine the required encoding strategies.

  • For any data that will be output to another web page, especially any data that was received from external inputs, use the appropriate encoding on all non-alphanumeric characters.

  • Parts of the same output document may require different encodings, which will vary depending on whether the output is in the:

  • etc. Note that HTML Entity Encoding is only appropriate for the HTML body.

  • Consult the XSS Prevention Cheat Sheet [REF-724] for more details on the types of encoding and escaping that are needed.

  • Use and specify an output encoding that can be handled by the downstream component that is reading the output. Common encodings include ISO-8859-1, UTF-7, and UTF-8. When an encoding is not specified, a downstream component may choose a different encoding, either by assuming a default encoding or automatically inferring which encoding is being used, which can be erroneous. When the encodings are inconsistent, the downstream component might treat some character or byte sequences as special, even if they are not special in the original encoding. Attackers might then be able to exploit this discrepancy and conduct injection attacks; they even might be able to bypass protection mechanisms that assume the original encoding is also being used by the downstream component.

  • The problem of inconsistent output encodings often arises in web pages. If an encoding is not specified in an HTTP header, web browsers often guess about which encoding is being used. This can open up the browser to subtle XSS attacks.

  • Assume all input is malicious. Use an “accept known good” input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.

  • When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, “boat” may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as “red” or “blue.”

  • Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code’s environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.

  • When dynamically constructing web pages, use stringent allowlists that limit the character set based on the expected value of the parameter in the request. All input should be validated and cleansed, not just parameters that the user is supposed to specify, but all data in the request, including hidden fields, cookies, headers, the URL itself, and so forth. A common mistake that leads to continuing XSS vulnerabilities is to validate only fields that are expected to be redisplayed by the site. It is common to see data from the request that is reflected by the application server or the application that the development team did not anticipate. Also, a field that is not currently reflected may be used by a future developer. Therefore, validating ALL parts of the HTTP request is recommended.

  • Note that proper output encoding, escaping, and quoting is the most effective solution for preventing XSS, although input validation may provide some defense-in-depth. This is because it effectively limits what will appear in output. Input validation will not always prevent XSS, especially if you are required to support free-form text fields that could contain arbitrary characters. For example, in a chat application, the heart emoticon ("<3") would likely pass the validation step, since it is commonly used. However, it cannot be directly inserted into the web page because it contains the “<” character, which would need to be escaped or otherwise handled. In this case, stripping the “<” might reduce the risk of XSS, but it would produce incorrect behavior because the emoticon would not be recorded. This might seem to be a minor inconvenience, but it would be more important in a mathematical forum that wants to represent inequalities.

  • Even if you make a mistake in your validation (such as forgetting one out of 100 input fields), appropriate encoding is still likely to protect you from injection-based attacks. As long as it is not done in isolation, input validation is still a useful technique, since it may significantly reduce your attack surface, allow you to detect some attacks, and provide other security benefits that proper encoding does not address.

  • Ensure that you perform input validation at well-defined interfaces within the application. This will help protect the application even if a component is reused or moved elsewhere.

References