Errata - 2.1 Security Update, March 2018
Summary
This vulnerability affects all installations of Open-AudIT prior to version 2.2.
A patched version of Open-AudIT (2.2) will be made available from http://www.open-audit.org/downloads.php and https://opmantek.com/network-tools-download/.
Users are advised to upgrade ASAP when 2.2 is released.
Details
A vulnerability affecting the web view files is caused because of insufficient output escaping. The vulnerability requires an Admin level user to purposely insert javascript into a field that can be displayed in the web pages. This issue has been addressed by a review of all web view files in Open-AudIT Professional & Enterprise to ensure all output is sufficiently escaped before being sent to the browser.
Severity: Low
The conditions of successful exploitation are that the attacker must have Admin level access to Open-AudIT and maliciously insert javascript code to a field that is (was) not correctly escaped prior to browser output.
Products Affected
Open-AudIT Professional and Enterprise 2.1 and earlier. Open-AudIT Community is not affected by this vulnerability.
Available Updates
A patch for the issue described in this bulletin is available in the soon to be released Open-AudIT v2.2. This release will be available shortly from http://www.openaudit.org and https://opmantek.com.
Workarounds and Mitigations
Upgrade to Open-AudIT 2.2.
The vulnerability was addressed by Opmantek and upgrading to Open-AudIT 2.2 will include this fix and remove the vulnerability.
The preferred method of mitigation is an upgrade to Open-AudIT 2.2.
If you are affected and require a patch ASAP, please contact Opmantek Support via your regular support channel.