CVE-2018-16471

Related Vulnerabilities: CVE-2018-16471  

There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.

The MITRE CVE dictionary describes this issue as:

There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.

Find out more about CVE-2018-16471 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat OpenStack Platform and OpenShift Enterprise are not affected. Whilst the version of rack in use as a dependency in optional components is vulnerable, the vulnerable variable is not used in a way that could lead to XSS.

Subscription Asset Manager is now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having a security impact Moderate, and is not currently planned to be addressed in future updates.

Red Hat CloudForms and Satellite 6 are not affected. Whilst the version of rack in use as a dependency in optional components is vulnerable, the vulnerable variable is not used in a way that could lead to XSS.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Changed
Confidentiality Low
Integrity Impact Low
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 ruby193-rubygem-rack Will not fix
Red Hat Software Collections for Red Hat Enterprise Linux rh-ror50-rubygem-rack Affected
Red Hat Software Collections for Red Hat Enterprise Linux rh-ror42-rubygem-rack Affected
Red Hat Satellite 6 rubygem-rack Not affected
Red Hat Satellite 6 tfm-ror51-rubygem-rack Not affected
Red Hat OpenStack Platform Operational Tools 9 rubygem-rack Not affected
Red Hat OpenStack Platform Operational Tools 14 rubygem-rack Not affected
Red Hat OpenStack Platform 13.0 Operational Tools for RHEL 7 rubygem-rack Not affected
Red Hat OpenStack Platform 12.0 Operational Tools for RHEL 7 rubygem-rack Not affected
Red Hat OpenStack Platform 10.0 Operational Tools for RHEL 7 rubygem-rack Not affected
Red Hat OpenShift Enterprise 3.2 rubygem-rack Not affected
Red Hat OpenShift Enterprise 3.1 rubygem-rack Not affected
Red Hat OpenShift Container Platform 3.4 rubygem-rack Not affected
Red Hat OpenShift Container Platform 3.3 rubygem-rack Not affected
Red Hat Gluster Storage 3 rubygem-rack Affected
Red Hat Enterprise Linux OpenStack Platform 8.0 Operational Tools for RHEL 7 rubygem-rack Not affected

External References