Bug #56189 | Security - XSS vulnerability on the Manage Users page. | ||
---|---|---|---|
Submitted: | 23 Aug 2010 13:00 | Modified: | 25 Aug 2010 0:09 |
Reporter: | Mark Leith | Email Updates: | |
Status: | Closed | Impact on me: | |
Category: | MySQL Enterprise Monitor: Web | Severity: | S1 (Critical) |
Version: | 2.2.3.1741 | OS: | Any |
Assigned to: | Josh Sled | CPU Architecture: | Any |
[23 Aug 2010 13:00]
Mark Leith
[23 Aug 2010 21:08]
Enterprise Tools JIRA Robot
Josh Sled writes: revno: 8135 revision-id: josh.sled@oracle.com-20100823210520-ap06oua6s4h10swp parent: josh.sled@oracle.com-20100823202403-ghvf087xaldwx1z7 committer: Josh Sled <josh.sled@oracle.com> branch nick: 2.2 timestamp: Mon 2010-08-23 17:05:20 -0400 message: EM-4740: correct XSS vector of unescaped user names in localized messages in default page template, dashboard.
[23 Aug 2010 21:18]
Enterprise Tools JIRA Robot
Josh Sled writes: In terms of reproduction, that that one must log in as the "test<script>[...]" user to exhibit the problem.
[8 Sep 2010 15:52]
MC Brown
A note has been added to the 2.2.3 changelog: The content of the user field on the <guilabel>Edit User</guilabel> screen was not protected so it was possible to insert scripting instructions into the field contents.
[18 Apr 2011 14:15]
Mark Leith
Originally reported by Myles Hosford.