Clone for 5.2-0. I don't want to release the complete 5.2-1 version, it has some delegate admin feature code in it. +++ This bug was initially created as a clone of Bug #49001 +++ # udm container/cn create --set name='<span onmouseover="alert(document.cookie)">foo</span>' Object created: cn=\<span onmouseover\=\"alert(document.cookie)\"\>foo\</span\>,dc=dev,dc=local → Open the LDAP Directory At least three vulnerable places: 1. the tree; 2. the Search-Grid, 3. the Remove dialog. The detail page of this object and subobjects of it seems to be okay.
Hmm... cannot choose 5.2-0-errata. Hopefully, this still works
univention-web.yaml bae2b9e6f60b | Bug #58267: Fix various Cross Site Scripting (XSS) vulnerabilities in UDM via crafted LDAP RDNs and other attributes univention-web (6.0.8-1) 10f40e10fb8d | Bug #58267: Fix changelog having the wrong bug number bae2b9e6f60b | Bug #58267: Fix various Cross Site Scripting (XSS) vulnerabilities in UDM via crafted LDAP RDNs and other attributes univention-management-console-module-udm.yaml bae2b9e6f60b | Bug #58267: Fix various Cross Site Scripting (XSS) vulnerabilities in UDM via crafted LDAP RDNs and other attributes univention-management-console-module-udm (12.0.4-1) 10f40e10fb8d | Bug #58267: Fix changelog having the wrong bug number bae2b9e6f60b | Bug #58267: Fix various Cross Site Scripting (XSS) vulnerabilities in UDM via crafted LDAP RDNs and other attributes
QA: Code review: OK Detail page: OK Tree view: OK Delete dialog: OK Advisory: OK Test: OK
<https://errata.software-univention.de/#/?erratum=5.2x83> <https://errata.software-univention.de/#/?erratum=5.2x84>