Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

For systems affected by CVE-2021-27945 - Cross-Site Scripting where a software upgrade is deemed risky, a configuration change can instead be deployed to prevent the vulnerability from being exploited.

It is recommended that you have a Squirro solution engineer help with this change. They likely have reached out to you already, otherwise please contact us at support@squirro.com to help.

Configuration

The configuration change relies on the fact that all Squirro services are only exposed to the outside world using the nginx web server. Additionally the affected endpoint of Squirro is not used anywhere. As a result we can simply block the path which had the Cross-Site Scripting issue from being accessed through a nginx configuration change.

Use the following steps to do so:

  1. Edit the file /etc/nginx/conf.d/frontend.conf.

  2. Add the following line at the very bottom of the file:

    location /help { return 404; }
  3. Save the file and exit the editor.

  4. Verify that the configuration is still valid by running this command:

    nginx -t
  5. If that command is successful, reload nginx

    1. On RHEL / CentOS 8 and 7 you can use: systemctl reload nginx

    2. On RHEL / CentOS 6 you can use: service nginx reload

  6. Verify that the configuration change has taken effect by accessing the URL https://your-squirro-server/help/test

  • No labels