Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Summary

JavaScript code can be injected into the User Profile Configuration to the Mapping for LDAP Attribute(s) field and to the field of Location of User Profile Picture when editing User Profile Picture – Synchronization

Advisory Release Date

04 December 2020 

Product

User Profiles for Confluence

Affected User Profiles for Confluence Versions

all version until version 3.3.7

Fixed User Profiles for Confluence Version

3.3.8

Problem

We were able to identify 2 security vulnerabilities in our User Profiles for Confluence app.

The first vulnerability allows JavaScript code to be injected into the Mapping for LDAP Attribute(s) field in the editing dialog of any profile element. The injected code would then be executed when an LDAP synchronization would start.

The next vulnerability allows JavaScript code to be injected into the Location of User Profile Picture
in the editing dialog of User Profile Picture – Synchronization profile element. Same as the first vulnerability, the injected code would then be executed when an LDAP synchronization would start.

Solution

If you are using the User Profiles for Confluence app in one of the affected versions until 3.3.7, please immediately update to User Profiles for Confluence 3.3.8.

Root Cause

Due to error with sanitizing inputs, users editing the profile elements could potentially inject malicious data into the Mapping for LDAP Attribute(s) field and Location of User Profile Picture field. This qualifies as stored cross-site scripting (XSS) vulnerability. The malicious code will then be executed when LDAP synchronization would be triggered.
We have fixed the problematic code to prevent displaying such potentially harmful element values.

  • No labels