Bug #16763
closedPotential Stored XSS in ``diag_arp.php`` when using ISC DHCP
100%
Description
There is a potential stored XSS possible due to the way diag_arp.php prints hostnames retrieved from the DHCP lease database when using the ISC DHCP backend.
A malicious DHCP client on a local network connected to an interface with ISC DHCP service active can send a specially-crafted hostname containing an XSS payload. The ISC DHCP daemon will accept that hostname and store it in the leases database. The diag_arp.php page reads the DHCP lease database when resolving hostnames to display on the page, and it prints those hostnames without encoding.
This does not affect the Kea DHCP backend as it properly cleans up the hostname of any invalid characters before storing the value, rendering it inert.
Updated by Jim Pingle 7 days ago
- Status changed from Confirmed to Feedback
- % Done changed from 0 to 100
Applied in changeset commit:228b2a0e66d97abcae2dd5b8c2c91e76620bea20.
Updated by Jim Pingle 1 day ago
- Status changed from Feedback to Resolved
Patch is available in the Recommended Patches section of the latest System Patches Package version.