CVE-2013-1871
Description
Cross-site scripting (XSS) vulnerability in account/EditAddress.do in Spacewalk and Red Hat Network (RHN) Satellite 5.6 allows remote attackers to inject arbitrary web script or HTML via the type parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-site scripting in Spacewalk and Red Hat Satellite 5.6 EditAddress page via the type parameter allows remote attackers to inject arbitrary HTML/JavaScript.
Vulnerability
A cross-site scripting (XSS) vulnerability exists in the account/EditAddress.do page of Spacewalk and Red Hat Network (RHN) Satellite 5.6. The type parameter is not properly sanitized before being reflected in the response, allowing an attacker to inject arbitrary web script or HTML [1][4]. Versions of Spacewalk and RHN Satellite 5.6 are affected; the SUSE Spacewalk stack update also includes a fix for this issue [2].
Exploitation
An attacker can exploit this flaw by crafting a malicious URL containing the type parameter with injected script payload, e.g., GET /rhn/account/EditAddress.do?type=M83ab7c47ea873a9d. When a victim (such as an authenticated user) visits this URL, the script executes in the context of the victim's browser, because the input is reflected unescaped in the response HTML [4]. No authentication is required for the attacker to send the link; user interaction is needed for the victim to click or load the crafted URL.
Impact
Successful exploitation leads to arbitrary JavaScript execution in the victim's browser within the Spacewalk/Satellite session context. This can result in session hijacking, theft of sensitive session cookies, defacement of the page, or other client-side attacks [1][2][4]. The attacker gains no direct server access but can compromise the victim's authenticated session.
Mitigation
Red Hat released RHSA-2014:0148 on 2014-02-14, which fixed this vulnerability in Red Hat Network Satellite 5.6 [1]. SUSE published SUSE-SU-2014:0222-1 on 2014-02-20, updating the Spacewalk stack to address CVE-2013-1871 and other issues [2]. Users should apply the respective updates, which modify the EditAddress.do page to sanitize the type parameter. If patching is not immediately possible, careful input validation or web application firewall rules could mitigate the risk, but the vendor-update is the recommended solution. No known exploitation in the wild was reported at the time of disclosure.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3- Range: 5.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.