Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-2104
Vulnerability from cvelistv5
Published
2017-04-13 14:00
Modified
2024-08-05 23:17
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) <input:hidden> or (6) <bean:message> tags.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0590.html | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1305677 | Issue Tracking, Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1313515 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0590.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1305677 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1313515 | Issue Tracking, Third Party Advisory, VDB Entry |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0590", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-13T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:0590", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2104", "datePublished": "2017-04-13T14:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85EA16E0-9261-45C4-840F-5366E9EAC5E1\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags.\"}, {\"lang\": \"es\", \"value\": \"Varias vulnerabilidades de XSS en Red Hat Satellite 5 permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\\u00e9s de (1) el par\\u00e1metro label a admin/BunchDetail.do; (2) el package_name, (3) search_subscribed_channels o (4) el par\\u00e1metro channel_filter a software/packages/NameOverview.do; O vectores no especificados relacionados con (5) o (6) tags.\"}]", "id": "CVE-2016-2104", "lastModified": "2024-11-21T02:47:48.687", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-04-13T14:59:01.590", "references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0590.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1305677\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1313515\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0590.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1305677\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1313515\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\", \"VDB Entry\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2016-2104\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-04-13T14:59:01.590\",\"lastModified\":\"2024-11-21T02:47:48.687\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags.\"},{\"lang\":\"es\",\"value\":\"Varias vulnerabilidades de XSS en Red Hat Satellite 5 permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) el par\u00e1metro label a admin/BunchDetail.do; (2) el package_name, (3) search_subscribed_channels o (4) el par\u00e1metro channel_filter a software/packages/NameOverview.do; O vectores no especificados relacionados con (5) o (6) tags.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85EA16E0-9261-45C4-840F-5366E9EAC5E1\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0590.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1305677\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1313515\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0590.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1305677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1313515\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
ghsa-ch75-g728-9c8j
Vulnerability from github
Published
2022-05-17 02:49
Modified
2022-05-17 02:49
Severity ?
Details
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5)
{ "affected": [], "aliases": [ "CVE-2016-2104" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-04-13T14:59:00Z", "severity": "MODERATE" }, "details": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags.", "id": "GHSA-ch75-g728-9c8j", "modified": "2022-05-17T02:49:25Z", "published": "2022-05-17T02:49:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
CVE-2016-2104
Vulnerability from fkie_nvd
Published
2017-04-13 14:59
Modified
2024-11-21 02:47
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) <input:hidden> or (6) <bean:message> tags.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0590.html | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1305677 | Issue Tracking, Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1313515 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0590.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1305677 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1313515 | Issue Tracking, Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "85EA16E0-9261-45C4-840F-5366E9EAC5E1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags." }, { "lang": "es", "value": "Varias vulnerabilidades de XSS en Red Hat Satellite 5 permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) el par\u00e1metro label a admin/BunchDetail.do; (2) el package_name, (3) search_subscribed_channels o (4) el par\u00e1metro channel_filter a software/packages/NameOverview.do; O vectores no especificados relacionados con (5) o (6) tags." } ], "id": "CVE-2016-2104", "lastModified": "2024-11-21T02:47:48.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-13T14:59:01.590", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
RHSA-2016:0590
Vulnerability from csaf_redhat
Published
2016-04-04 15:35
Modified
2024-11-22 09:57
Summary
Red Hat Security Advisory: spacewalk-java security update
Notes
Topic
An update for spacewalk-java is now available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.
Security Fix(es):
* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)
* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)
* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)
Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Hutař (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for spacewalk-java is now available for Red Hat Satellite 5.7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.\n\nSecurity Fix(es):\n\n* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)\n\nRed Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Huta\u0159 (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0590", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1181152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181152" }, { "category": "external", "summary": "1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "1313515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "category": "external", "summary": "1313517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313517" }, { "category": "external", "summary": "1320444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "category": "external", "summary": "1320452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "category": "external", "summary": "1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0590.json" } ], "title": "Red Hat Security Advisory: spacewalk-java security update", "tracking": { "current_release_date": "2024-11-22T09:57:18+00:00", "generator": { "date": "2024-11-22T09:57:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0590", "initial_release_date": "2016-04-04T15:35:36+00:00", "revision_history": [ { "date": "2016-04-04T15:35:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-04-04T15:35:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:57:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-postgresql@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@2.3.8-134.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-0284", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1181472" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0284" }, { "category": "external", "summary": "RHBZ#1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0284", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284" } ], "release_date": "2015-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)" }, { "cve": "CVE-2016-2103", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305681" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: multiple stored XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2103" }, { "category": "external", "summary": "RHBZ#1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2103", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103" } ], "release_date": "2016-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: multiple stored XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Adam Willard" ], "organization": "Raytheon Foreground Security" } ], "cve": "CVE-2016-2104", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305677" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: stored and reflected XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "category": "external", "summary": "RHBZ#1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2104", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: stored and reflected XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-3079", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1320940" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "spacewalk-java: Multiple XSS issues in WebUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "category": "external", "summary": "RHBZ#1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" } ], "release_date": "2016-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spacewalk-java: Multiple XSS issues in WebUI" } ] }
rhsa-2016:0590
Vulnerability from csaf_redhat
Published
2016-04-04 15:35
Modified
2024-11-22 09:57
Summary
Red Hat Security Advisory: spacewalk-java security update
Notes
Topic
An update for spacewalk-java is now available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.
Security Fix(es):
* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)
* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)
* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)
Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Hutař (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for spacewalk-java is now available for Red Hat Satellite 5.7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.\n\nSecurity Fix(es):\n\n* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)\n\nRed Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Huta\u0159 (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0590", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1181152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181152" }, { "category": "external", "summary": "1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "1313515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "category": "external", "summary": "1313517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313517" }, { "category": "external", "summary": "1320444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "category": "external", "summary": "1320452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "category": "external", "summary": "1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0590.json" } ], "title": "Red Hat Security Advisory: spacewalk-java security update", "tracking": { "current_release_date": "2024-11-22T09:57:18+00:00", "generator": { "date": "2024-11-22T09:57:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0590", "initial_release_date": "2016-04-04T15:35:36+00:00", "revision_history": [ { "date": "2016-04-04T15:35:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-04-04T15:35:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:57:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-postgresql@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@2.3.8-134.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-0284", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1181472" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0284" }, { "category": "external", "summary": "RHBZ#1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0284", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284" } ], "release_date": "2015-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)" }, { "cve": "CVE-2016-2103", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305681" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: multiple stored XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2103" }, { "category": "external", "summary": "RHBZ#1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2103", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103" } ], "release_date": "2016-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: multiple stored XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Adam Willard" ], "organization": "Raytheon Foreground Security" } ], "cve": "CVE-2016-2104", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305677" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: stored and reflected XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "category": "external", "summary": "RHBZ#1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2104", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: stored and reflected XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-3079", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1320940" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "spacewalk-java: Multiple XSS issues in WebUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "category": "external", "summary": "RHBZ#1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" } ], "release_date": "2016-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spacewalk-java: Multiple XSS issues in WebUI" } ] }
rhsa-2016_0590
Vulnerability from csaf_redhat
Published
2016-04-04 15:35
Modified
2024-11-22 09:57
Summary
Red Hat Security Advisory: spacewalk-java security update
Notes
Topic
An update for spacewalk-java is now available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.
Security Fix(es):
* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)
* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)
* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)
Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Hutař (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for spacewalk-java is now available for Red Hat Satellite 5.7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.\n\nSecurity Fix(es):\n\n* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)\n\nRed Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Huta\u0159 (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0590", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1181152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181152" }, { "category": "external", "summary": "1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "1313515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "category": "external", "summary": "1313517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313517" }, { "category": "external", "summary": "1320444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "category": "external", "summary": "1320452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "category": "external", "summary": "1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0590.json" } ], "title": "Red Hat Security Advisory: spacewalk-java security update", "tracking": { "current_release_date": "2024-11-22T09:57:18+00:00", "generator": { "date": "2024-11-22T09:57:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0590", "initial_release_date": "2016-04-04T15:35:36+00:00", "revision_history": [ { "date": "2016-04-04T15:35:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-04-04T15:35:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:57:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-postgresql@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@2.3.8-134.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-0284", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1181472" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0284" }, { "category": "external", "summary": "RHBZ#1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0284", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284" } ], "release_date": "2015-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)" }, { "cve": "CVE-2016-2103", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305681" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: multiple stored XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2103" }, { "category": "external", "summary": "RHBZ#1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2103", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103" } ], "release_date": "2016-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: multiple stored XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Adam Willard" ], "organization": "Raytheon Foreground Security" } ], "cve": "CVE-2016-2104", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305677" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: stored and reflected XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "category": "external", "summary": "RHBZ#1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2104", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: stored and reflected XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-3079", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1320940" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "spacewalk-java: Multiple XSS issues in WebUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "category": "external", "summary": "RHBZ#1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" } ], "release_date": "2016-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spacewalk-java: Multiple XSS issues in WebUI" } ] }
gsd-2016-2104
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) <input:hidden> or (6) <bean:message> tags.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-2104", "description": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags.", "id": "GSD-2016-2104", "references": [ "https://www.suse.com/security/cve/CVE-2016-2104.html", "https://access.redhat.com/errata/RHSA-2016:0590" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-2104" ], "details": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags.", "id": "GSD-2016-2104", "modified": "2023-12-13T01:21:19.316020Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2016-0590.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2104" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) \u003cinput:hidden\u003e or (6) \u003cbean:message\u003e tags." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "name": "RHSA-2016:0590", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2023-02-12T23:17Z", "publishedDate": "2017-04-13T14:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.