Errata - 4.2.0 and earlier Javascript vulnerability
Javascript link creation vulnerability
Last revised: 2021-11-01
Summary
Unfortunately there is an issue with link creation in the GUI with Open-AudIT Community.
If a bad value is passed to the routine via a URL, javascript code can be executed.
This requires the user be logged in to Open-AudIT Community to trigger.
Severity: Medium
The conditions of successful exploitation are that the user clicking the bad URL be logged in to Open-AudIT Community.
Products Affected
Open-AudIT Community all versions.
Available Updates
A patch for the issue described in this bulletin will be available in the next released Open-AudIT v4.3.0.
Workarounds and Mitigations
Download the attached file and replace the following file:
Linux - /usr/local/open-audit/code_igniter/application/helpers/output_helper.php
Windows - c:\xampp\open-audit\code_igniter\application\helpers\output_helper.php
The file is also available on Github at https://raw.githubusercontent.com/Opmantek/open-audit/master/code_igniter/application/helpers/output_helper.php
You can view the associated commits also on Github at:
https://github.com/Opmantek/open-audit/commit/e37b64bbd0219f03cb71cc1cd5bb010166a2b846