CVE Vulnerabilities

CVE-2014-7811

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Published: Jan 15, 2015 | Modified: Feb 13, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
3.5 LOW
AV:N/AC:M/Au:S/C:N/I:P/A:N
RedHat/V2
3.5 MODERATE
AV:N/AC:M/Au:S/C:N/I:P/A:N
RedHat/V3
Ubuntu

Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk and Red Hat Network (RHN) Satellite before 5.7.0 allow remote authenticated users to inject arbitrary web script or HTML via crafted XML data to the REST API.

Weakness

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Affected Software

Name Vendor Start Version End Version
Network_satellite Redhat * 5.6 (including)
Spacewalk Redhat - (including) - (including)
Red Hat Satellite 5.7 RedHat ace-editor-0:1.1.3-2.el6sat *
Red Hat Satellite 5.7 RedHat antlr-0:2.7.7-7.ep5.el6 *
Red Hat Satellite 5.7 RedHat apache-commons-beanutils-0:1.8.3-10.redhat_2.ep6.el6 *
Red Hat Satellite 5.7 RedHat apache-commons-cli-0:1.2-7.5.redhat_2.ep6.el6.4 *
Red Hat Satellite 5.7 RedHat bootstrap-0:3.0.0-4.el6sat *
Red Hat Satellite 5.7 RedHat bootstrap-datepicker-0:1.3.0-2.el6sat *
Red Hat Satellite 5.7 RedHat c3p0-0:0.9.1.2-2.ep5.el6 *
Red Hat Satellite 5.7 RedHat cglib-0:2.2-5.6.ep5.el6 *
Red Hat Satellite 5.7 RedHat cobbler-0:2.0.7-52.el6sat *
Red Hat Satellite 5.7 RedHat cobbler-loaders-0:1.0.3-1.el6sat *
Red Hat Satellite 5.7 RedHat concurrent-0:1.3.4-10.1.5_jboss_update1.ep5.el6 *
Red Hat Satellite 5.7 RedHat cx_Oracle-0:5.1.2-5.el6sat *
Red Hat Satellite 5.7 RedHat dojo-0:1.6.1-1.el6sat *
Red Hat Satellite 5.7 RedHat dom4j-0:1.6.1-11.1.ep5.el6 *
Red Hat Satellite 5.7 RedHat dwr-0:3.0rc2-6.el6sat *
Red Hat Satellite 5.7 RedHat editarea-0:0.8.2-14.el6sat *
Red Hat Satellite 5.7 RedHat eventReceivers-0:2.20.18-1.el6sat *
Red Hat Satellite 5.7 RedHat font-awesome-0:4.0.3-1.el6sat *
Red Hat Satellite 5.7 RedHat glassfish-jsf-0:1.2_13-3.1.4.ep5.el6 *
Red Hat Satellite 5.7 RedHat hibernate3-1:3.3.2-1.3.GA_CP04.ep5.el6 *
Red Hat Satellite 5.7 RedHat jabberd-0:2.2.8-23.el6sat *
Red Hat Satellite 5.7 RedHat jabberpy-0:0.5-0.22.el6sat *
Red Hat Satellite 5.7 RedHat jakarta-commons-chain-0:1.2-2.2.2.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-codec-0:1.3-11.7.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-digester-0:1.8.1-8.1.1.1.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-el-0:1.0-19.2.1.1.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-fileupload-1:1.1.1-7.4.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-io-0:1.4-4.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-lang-0:2.4-1.1.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-logging-0:1.1.1-1.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-parent-0:11-2.1.2.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-commons-validator-0:1.3.1-7.5.2.ep5.el6 *
Red Hat Satellite 5.7 RedHat jakarta-oro-0:2.0.8-6.6.el6 *
Red Hat Satellite 5.7 RedHat jakarta-taglibs-standard-0:1.1.1-12.ep5.el6 *
Red Hat Satellite 5.7 RedHat java-1.6.0-ibm-1:1.6.0.16.2-1jpp.1.el6 *
Red Hat Satellite 5.7 RedHat javassist-0:3.12.0-6.SP1.ep5.el6 *
Red Hat Satellite 5.7 RedHat jboss-javaee-0:5.0.1-2.9.ep5.el6 *
Red Hat Satellite 5.7 RedHat jcommon-0:1.0.16-1.2.2.ep5.el6 *
Red Hat Satellite 5.7 RedHat jdom-0:1.1.1-1.el6 *
Red Hat Satellite 5.7 RedHat jfreechart-0:1.0.13-2.3.2.1.1.ep5.el6 *
Red Hat Satellite 5.7 RedHat jpam-0:0.4-27.el6sat *
Red Hat Satellite 5.7 RedHat jquery-timepicker-0:1.3.3-1.el6sat *
Red Hat Satellite 5.7 RedHat jquery-ui-0:1.10.4.custom-2.el6sat *
Red Hat Satellite 5.7 RedHat libapreq2-0:2.13-5.el6sat *
Red Hat Satellite 5.7 RedHat libgsasl-0:1.4.0-5.el6sat *
Red Hat Satellite 5.7 RedHat libntlm-0:1.0-4.el6sat *
Red Hat Satellite 5.7 RedHat libreadline-java-0:0.8.0-24.3.el6 *
Red Hat Satellite 5.7 RedHat libyaml-0:0.1.2-5.el6 *
Red Hat Satellite 5.7 RedHat MessageQueue-0:3.26.10-1.el6sat *
Red Hat Satellite 5.7 RedHat momentjs-0:2.6.0-2.2.el6sat *
Red Hat Satellite 5.7 RedHat nocpulse-common-0:2.2.9-1.el6sat *
Red Hat Satellite 5.7 RedHat nocpulse-db-perl-0:3.6.5-1.el6sat *
Red Hat Satellite 5.7 RedHat NOCpulsePlugins-0:2.209.7-1.el6sat *
Red Hat Satellite 5.7 RedHat NPalert-0:1.127.12-1.el6sat *
Red Hat Satellite 5.7 RedHat nutch-0:1.0-0.16.20081201040121nightly.el6sat *
Red Hat Satellite 5.7 RedHat objectweb-asm-0:3.2-2.1.el6 *
Red Hat Satellite 5.7 RedHat oracle-config-0:1.1-7.el6sat *
Red Hat Satellite 5.7 RedHat oracle-instantclient-0:10.2.0-47.el6sat *
Red Hat Satellite 5.7 RedHat oracle-instantclient-selinux-0:10.2.0.19-6.el6sat *
Red Hat Satellite 5.7 RedHat oracle-selinux-0:0.1.23.36-1.el6sat *
Red Hat Satellite 5.7 RedHat osad-0:5.11.44-5.el6sat *
Red Hat Satellite 5.7 RedHat oscache-0:2.2-3.ep5.el6 *
Red Hat Satellite 5.7 RedHat patternfly1-0:1.0.5-4.el6sat *
Red Hat Satellite 5.7 RedHat perl-Apache-DBI-0:1.09-3.el6sat *
Red Hat Satellite 5.7 RedHat perl-BerkeleyDB-0:0.38-6.el6sat *
Red Hat Satellite 5.7 RedHat perl-Cache-Cache-0:1.06-2.el6sat *
Red Hat Satellite 5.7 RedHat perl-Class-MethodMaker-0:2.16-4.el6 *
Red Hat Satellite 5.7 RedHat perl-Class-Singleton-0:1.4-6.el6 *
Red Hat Satellite 5.7 RedHat perl-Config-IniFiles-0:2.47-5.el6sat *
Red Hat Satellite 5.7 RedHat perl-Convert-BinHex-0:1.119-10.1.el6 *
Red Hat Satellite 5.7 RedHat perl-Crypt-DES-0:2.05-10.el6sat *
Red Hat Satellite 5.7 RedHat perl-Crypt-GeneratePassword-0:0.03-15.el6sat *
Red Hat Satellite 5.7 RedHat perl-DateTime-1:0.5300-1.el6 *
Red Hat Satellite 5.7 RedHat perl-DBD-Oracle-0:1.62-3.el6sat *
Red Hat Satellite 5.7 RedHat perl-Email-Date-Format-0:1.002-5.el6 *
Red Hat Satellite 5.7 RedHat perl-Filesys-Df-0:0.92-8.el6sat *
Red Hat Satellite 5.7 RedHat perl-HTML-TableExtract-0:2.10-8.el6sat *
Red Hat Satellite 5.7 RedHat perl-IO-stringy-0:2.110-10.1.el6 *
Red Hat Satellite 5.7 RedHat perl-IPC-ShareLite-0:0.13-6.el6sat *
Red Hat Satellite 5.7 RedHat perl-List-MoreUtils-0:0.22-10.el6 *
Red Hat Satellite 5.7 RedHat perl-Mail-RFC822-Address-0:0.3-12.el6sat *
Red Hat Satellite 5.7 RedHat perl-MIME-Lite-0:3.027-2.el6 *
Red Hat Satellite 5.7 RedHat perl-MIME-tools-0:5.427-4.el6 *
Red Hat Satellite 5.7 RedHat perl-MIME-Types-0:1.28-2.el6 *
Red Hat Satellite 5.7 RedHat perl-Net-INET6Glue-0:0.5-3.el6sat *
Red Hat Satellite 5.7 RedHat perl-Net-IPv4Addr-0:0.10-7.el6sat *
Red Hat Satellite 5.7 RedHat perl-Net-SNMP-0:6.0.1-3.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-CLAC-0:1.9.9-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-Debug-0:1.23.17-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-Gritch-0:2.2.1-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-Object-0:1.26.12-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-OracleDB-0:1.28.27-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-PersistentConnection-0:1.10.1-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-Probe-0:1.184.18-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-ProcessPool-0:1.6.1-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-Scheduler-0:1.58.12-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-SetID-0:1.7.2-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-NOCpulse-Utils-0:1.14.12-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-Params-Validate-0:0.92-3.el6 *
Red Hat Satellite 5.7 RedHat perl-Satcon-0:1.20-1.el6sat *
Red Hat Satellite 5.7 RedHat perl-SOAP-Lite-0:0.710.10-3.el6 *
Red Hat Satellite 5.7 RedHat perl-TermReadKey-0:2.30-13.el6 *
Red Hat Satellite 5.7 RedHat perl-XML-Generator-0:1.01-6.el6sat *
Red Hat Satellite 5.7 RedHat postgresql92-0:1.1-21.el6 *
Red Hat Satellite 5.7 RedHat postgresql92-postgresql-0:9.2.8-2.el6 *
Red Hat Satellite 5.7 RedHat ProgAGoGo-0:1.11.6-1.el6sat *
Red Hat Satellite 5.7 RedHat pwstrength-bootstrap-0:1.0.2-4.el6sat *
Red Hat Satellite 5.7 RedHat python-debian-0:0.1.16-5.el6sat *
Red Hat Satellite 5.7 RedHat python-gzipstream-0:1.10.2-1.el6sat *
Red Hat Satellite 5.7 RedHat python-psycopg2-0:2.0.14-3.el6sat *
Red Hat Satellite 5.7 RedHat PyYAML-0:3.10-3.1.el6 *
Red Hat Satellite 5.7 RedHat quartz-0:1.8.4-5.el6sat *
Red Hat Satellite 5.7 RedHat redstone-xmlrpc-0:1.1_20071120-15.el6sat *
Red Hat Satellite 5.7 RedHat rhn-i18n-guides-0:5.7.0.1-1.el6sat *
Red Hat Satellite 5.7 RedHat rhn-i18n-release-notes-0:5.7.0.0-3.el6sat *
Red Hat Satellite 5.7 RedHat rhnlib-0:2.5.22-15.el6 *
Red Hat Satellite 5.7 RedHat rhnpush-0:5.5.81-8.el6sat *
Red Hat Satellite 5.7 RedHat rhn-solaris-bootstrap-0:5.4.1-9.el6sat *
Red Hat Satellite 5.7 RedHat roboto-0:1.2-2.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-bootstrap-0:1.11.5-1.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-bootstrap-server-0:1.13.5-1.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-cluster-0:2.2.2-1.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-general-0:1.216.31-1.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-generator-0:2.29.14-1.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-installer-0:3.24.6-1.el6sat *
Red Hat Satellite 5.7 RedHat SatConfig-spread-0:1.1.3-1.el6sat *
Red Hat Satellite 5.7 RedHat satellite-branding-0:5.7.0.24-1.el6sat *
Red Hat Satellite 5.7 RedHat satellite-doc-indexes-0:5.7.0-1.el6sat *
Red Hat Satellite 5.7 RedHat satellite-repo-0:5.6.0.3-1.el6sat *
Red Hat Satellite 5.7 RedHat satellite-schema-0:5.7.0.11-1.el6sat *
Red Hat Satellite 5.7 RedHat scdb-0:1.15.8-1.el6sat *
Red Hat Satellite 5.7 RedHat scl-utils-0:20120927-11.el6_5 *
Red Hat Satellite 5.7 RedHat select2-0:3.4.5-3.el6sat *
Red Hat Satellite 5.7 RedHat select2-bootstrap-css-0:1.3.0-5.el6sat *
Red Hat Satellite 5.7 RedHat simple-core-0:3.1.3-6.el6sat *
Red Hat Satellite 5.7 RedHat sitemesh-0:2.4.2-2.ep6.el6 *
Red Hat Satellite 5.7 RedHat SNMPAlerts-0:0.5.7-1.el6sat *
Red Hat Satellite 5.7 RedHat spacecmd-0:2.3.0-2.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-0:2.3.0-1.5.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-admin-0:2.2.7-1.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-backend-0:2.3.3-23.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-certs-tools-0:2.3.0-4.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-config-0:2.3.0-4.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-java-0:2.3.8-96.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-monitoring-0:2.2.1-1.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-monitoring-selinux-0:2.2.1-1.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-reports-0:2.3.0-5.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-schema-0:2.3.2-16.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-search-0:2.3.0-7.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-selinux-0:2.2.1-1.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-setup-0:2.3.0-15.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-setup-jabberd-0:2.0.1-1.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-setup-postgresql-0:2.3.0-21.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-slf4j-0:1.6.1-6.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-ssl-cert-check-1:2.3-1.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-utils-0:2.3.2-13.el6sat *
Red Hat Satellite 5.7 RedHat spacewalk-web-0:2.3.2-27.el6sat *
Red Hat Satellite 5.7 RedHat SputLite-0:1.10.1-1.el6sat *
Red Hat Satellite 5.7 RedHat ssl_bridge-0:1.9.3-1.el6sat *
Red Hat Satellite 5.7 RedHat status_log_acceptor-0:0.12.11-1.el6sat *
Red Hat Satellite 5.7 RedHat stringtree-json-0:2.0.9-10.el6sat *
Red Hat Satellite 5.7 RedHat struts-0:1.3.10-6.ep5.el6 *
Red Hat Satellite 5.7 RedHat tanukiwrapper-0:3.2.3-14.el6sat *
Red Hat Satellite 5.7 RedHat tsdb-0:1.27.29-1.el6sat *
Red Hat Satellite 5.7 RedHat udns-0:0.1-1.el6sat *
Red Hat Satellite 5.7 RedHat xalan-j2-0:2.7.0-9.8.el6 *

Extended Description

Cross-site scripting (XSS) vulnerabilities occur when:

There are three main kinds of XSS:

Once the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim’s machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site. Phishing attacks could be used to emulate trusted web sites and trick the victim into entering a password, allowing the attacker to compromise the victim’s account on that web site. Finally, the script could exploit a vulnerability in the web browser itself possibly taking over the victim’s machine, sometimes referred to as “drive-by hacking.” In many cases, the attack can be launched without the victim even being aware of it. Even with careful users, attackers frequently use a variety of methods to encode the malicious portion of the attack, such as URL encoding or Unicode, so the request looks less suspicious.

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Examples of libraries and frameworks that make it easier to generate properly encoded output include Microsoft’s Anti-XSS library, the OWASP ESAPI Encoding module, and Apache Wicket.

  • Understand the context in which your data will be used and the encoding that will be expected. This is especially important when transmitting data between different components, or when generating outputs that can contain multiple encodings at the same time, such as web pages or multi-part mail messages. Study all expected communication protocols and data representations to determine the required encoding strategies.

  • For any data that will be output to another web page, especially any data that was received from external inputs, use the appropriate encoding on all non-alphanumeric characters.

  • Parts of the same output document may require different encodings, which will vary depending on whether the output is in the:

  • etc. Note that HTML Entity Encoding is only appropriate for the HTML body.

  • Consult the XSS Prevention Cheat Sheet [REF-724] for more details on the types of encoding and escaping that are needed.

  • Use and specify an output encoding that can be handled by the downstream component that is reading the output. Common encodings include ISO-8859-1, UTF-7, and UTF-8. When an encoding is not specified, a downstream component may choose a different encoding, either by assuming a default encoding or automatically inferring which encoding is being used, which can be erroneous. When the encodings are inconsistent, the downstream component might treat some character or byte sequences as special, even if they are not special in the original encoding. Attackers might then be able to exploit this discrepancy and conduct injection attacks; they even might be able to bypass protection mechanisms that assume the original encoding is also being used by the downstream component.

  • The problem of inconsistent output encodings often arises in web pages. If an encoding is not specified in an HTTP header, web browsers often guess about which encoding is being used. This can open up the browser to subtle XSS attacks.

  • Assume all input is malicious. Use an “accept known good” input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.

  • When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, “boat” may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as “red” or “blue.”

  • Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code’s environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.

  • When dynamically constructing web pages, use stringent allowlists that limit the character set based on the expected value of the parameter in the request. All input should be validated and cleansed, not just parameters that the user is supposed to specify, but all data in the request, including hidden fields, cookies, headers, the URL itself, and so forth. A common mistake that leads to continuing XSS vulnerabilities is to validate only fields that are expected to be redisplayed by the site. It is common to see data from the request that is reflected by the application server or the application that the development team did not anticipate. Also, a field that is not currently reflected may be used by a future developer. Therefore, validating ALL parts of the HTTP request is recommended.

  • Note that proper output encoding, escaping, and quoting is the most effective solution for preventing XSS, although input validation may provide some defense-in-depth. This is because it effectively limits what will appear in output. Input validation will not always prevent XSS, especially if you are required to support free-form text fields that could contain arbitrary characters. For example, in a chat application, the heart emoticon ("<3") would likely pass the validation step, since it is commonly used. However, it cannot be directly inserted into the web page because it contains the “<” character, which would need to be escaped or otherwise handled. In this case, stripping the “<” might reduce the risk of XSS, but it would produce incorrect behavior because the emoticon would not be recorded. This might seem to be a minor inconvenience, but it would be more important in a mathematical forum that wants to represent inequalities.

  • Even if you make a mistake in your validation (such as forgetting one out of 100 input fields), appropriate encoding is still likely to protect you from injection-based attacks. As long as it is not done in isolation, input validation is still a useful technique, since it may significantly reduce your attack surface, allow you to detect some attacks, and provide other security benefits that proper encoding does not address.

  • Ensure that you perform input validation at well-defined interfaces within the application. This will help protect the application even if a component is reused or moved elsewhere.

References