// For flags

CVE-2018-15913

 

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Cloudera Manager 5.x through 5.15.0. One type of page in Cloudera Manager uses a 'returnUrl' parameter to redirect the user to another page in Cloudera Manager once a wizard is completed. The validity of this parameter was not checked. As a result, the user could be automatically redirected to an attacker's external site or perform a malicious JavaScript function that results in cross-site scripting (XSS). This was fixed by not allowing any value in the returnUrl parameter with patterns such as http://, https://, //, or javascript. The only exceptions to this rule are the SAML Login/Logout URLs, which remain supported since they are explicitly configured and they are not passed via the returnUrl parameter.

Se detecto un problema en Cloudera Manager 5.x a 5.15.0. Un tipo de página en Cloudera Manager usa un parámetro 'returnUrl' para redirigir al usuario a otra página en Cloudera Manager una vez que se completa un asistente. La validez de este parámetro no fue verificada. Como resultado, el usuario podría ser redirigido automáticamente al sitio externo de un atacante o realizar una función de JavaScript malintencionada que resulte en scripts entre sitios (XSS). Esto se solucionó al no permitir ningún valor en el parámetro returnUrl con patrones como http: //, https: //, // o javascript. Las únicas excepciones a esta regla son los URL de inicio / cierre de sesión de SAML, que siguen siendo compatibles porque están configurados explícitamente y no se pasan a través del parámetro returnUrl.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-28 CVE Reserved
  • 2019-06-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cloudera
Search vendor "Cloudera"
Cloudera Manager
Search vendor "Cloudera" for product "Cloudera Manager"
>= 5.0.0 <= 5.15.0
Search vendor "Cloudera" for product "Cloudera Manager" and version " >= 5.0.0 <= 5.15.0"
-
Affected