[midPoint] Security Advisory: Stored XSS vulnerability via 'name' property
    Radovan Semancik 
    radovan.semancik at evolveum.com
       
    Fri Aug 30 16:10:17 CEST 2019
    
    
  
Date: 30 August 2019
Severity: Medium (CVSS 4.3)
Affected versions: all released midPoint versions
Fixed in versions: 4.0 (unreleased), 3.9.1 (unreleased), 3.8.1 
(unreleased), 3.7.3 (unreleased)
Description
Stored cross-site scripting (XSS) vulnerability exists in midPoint user 
interface that can be exploited by manipulation of object 'name' property.
Severity and Impact
Attacker needs authorization to change object names in midPoint. Such 
authorization is usually granted only to administrators and other 
privileged users. Only "Repository objects" page is affected.
Mitigation
Users of affected MidPoint versions are advised to upgrade their 
deployments to the latest builds from the support branches.
As this is a medium severity issue, it is not forcing official 
maintenance releases of midPoint. However, the fix is provided in all 
the support branches.
Discussion and Explanation
The code of "Repository objects" page used wrong method to use object 
name to construct HTML code of a page. Therefore this page was 
vulnerable to the XSS attack.
Credit
This issue was reported by Nicolas Destorby the means of EU-Free and 
Open Source Software Auditing (EU-FOSSA2) project.
See Also
https://wiki.evolveum.com/display/midPoint/Security+Advisory%3A+Stored+XSS+vulnerability+via+%27name%27+property
-- 
Radovan Semancik
Software Architect
evolveum.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20190830/135692f5/attachment.htm>
    
    
More information about the midPoint
mailing list