[midPoint] Security Advisory: Plain text password in task objects in repository

Radovan Semancik radovan.semancik at evolveum.com
Fri Jun 14 17:01:17 CEST 2019


Date: 14 Jun 2019
Severity: Low (CVSS 3.7)
Affected versions: all released midPoint versions since 3.7
Fixed in versions: 4.0 (unreleased), 3.9.1 (unreleased), 3.8.1 
(unreleased), 3.7.3 (unreleased)

Description

Cross-site scripting (XSS) vulnerability exists in some parts of 
midPoint user interface, namely in organization displayName.

Severity and Impact

Malicious user can execute arbitrary scripts (e.g. Java Script) as part 
of midPoint web-based user interface. This vulnerability exists in 
displayName for all multi-value containers, including name of the 
organization/organizational unit. Exploiting this vulnerability requires 
administrative privileges, therefore severity and impact of this 
vulnerability is low.

Mitigation

Users of affected MidPoint versions are advised to upgrade their 
deployments to the latest builds from the support branches.
As this is a low severity issue, it is not forcing official maintenance 
releases of midPoint. However, the fix is provided in all the support 
branches.

Discussion and Explanation

MIdPoint user interface is based on Apache Wicket web framework. Proper 
use of Wicket web framework protects against most XSS-related 
vulnerabilities. However, one part of midPoint code was using the Wicket 
framework improperly, therefore opening XSS vulnerability. The 
vulnerability could be exploited by fabricating displayName of 
organizational unit, or in fact any display name of a multi-value container.

Credit

This issue was reported by tester known as Jespert123 by the means of 
EU-Free and Open Source Software Auditing (EU-FOSSA2) project.

See Also

https://wiki.evolveum.com/display/midPoint/Security+Advisory%3A+XSS+Vulnerability+In+displayName

-- 
Radovan Semancik
Software Architect
evolveum.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20190614/553058ab/attachment.htm>


More information about the midPoint mailing list