CVE-2017-3165: Cross-site vulnerabilities in Apache Brooklyn Severity: Major
Vendor: The Apache Software Foundation Versions Affected: Apache Brooklyn 0.9.0 and all prior versions Description: Apache Brooklyn's REST server is vulnerable to cross-site scripting where one authenticated user can cause scripts to run in the browser of another user authorized to access the first user's resources. This is due to improper escaping of server-side content. There is known to be a proof-of-concept exploit using this vulnerability. Solution: Upgrade to Apache Brooklyn 0.10.0. This includes commit [1] correctly escaping text and other content provided by a user to prevent untrusted javascript from executing in the browser. Temporary mitigation if you cannot upgrade to 0.10.0: Do not share a Brooklyn server with untrusted users without an enhanced entitlements scheme. Example exploit: Attacking user deploys an entity with a name "<script>alert(0);</script>". Any user browsing that entity will have the "alert(0);" script executed. Credit: This vulnerability was discovered by Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc., and reported to JPCERT/CC who reported them to the Apache Software Foundation on his behalf. Other references: JPCERT/CC JVN#55489964
