Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2011-2919
Vulnerability from cvelistv5
Published
2014-02-05 18:00
Modified
2024-08-06 23:15
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[Spacewalk-announce-list] 20111222 Spacewalk 1.6 has been released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" }, { "name": "RHSA-2011:1299", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-05T17:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[Spacewalk-announce-list] 20111222 Spacewalk 1.6 has been released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" }, { "name": "RHSA-2011:1299", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2919", "datePublished": "2014-02-05T18:00:00", "dateReserved": "2011-07-27T00:00:00", "dateUpdated": "2024-08-06T23:15:31.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"181F4E02-1FFA-4EFD-9DBF-3E23EFC200AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F66E06D8-78D7-492A-992C-8A70B5C36A97\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de XSS en Spacewalk 1.6, utilizado en Red Hat Network (RHN) Satellite, permite a atacantes remotos inyectar script Web o HTML a trav\\u00e9s de QueryString hacia la p\\u00e1gina SystemGroupList.do.\"}]", "id": "CVE-2011-2919", "lastModified": "2024-11-21T01:29:16.680", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-02-05T18:55:05.927", "references": "[{\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1299.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=713478\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1299.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=713478\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-2919\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-02-05T18:55:05.927\",\"lastModified\":\"2024-11-21T01:29:16.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en Spacewalk 1.6, utilizado en Red Hat Network (RHN) Satellite, permite a atacantes remotos inyectar script Web o HTML a trav\u00e9s de QueryString hacia la p\u00e1gina SystemGroupList.do.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"181F4E02-1FFA-4EFD-9DBF-3E23EFC200AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66E06D8-78D7-492A-992C-8A70B5C36A97\"}]}]}],\"references\":[{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1299.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=713478\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1299.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=713478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
cve-2011-2919
Vulnerability from fkie_nvd
Published
2014-02-05 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | network_satellite | - | |
redhat | spacewalk | 1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*", "matchCriteriaId": "181F4E02-1FFA-4EFD-9DBF-3E23EFC200AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F66E06D8-78D7-492A-992C-8A70B5C36A97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Spacewalk 1.6, utilizado en Red Hat Network (RHN) Satellite, permite a atacantes remotos inyectar script Web o HTML a trav\u00e9s de QueryString hacia la p\u00e1gina SystemGroupList.do." } ], "id": "CVE-2011-2919", "lastModified": "2024-11-21T01:29:16.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-05T18:55:05.927", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2011-2919
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-2919", "description": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.", "id": "GSD-2011-2919", "references": [ "https://www.suse.com/security/cve/CVE-2011-2919.html", "https://access.redhat.com/errata/RHSA-2011:1299" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-2919" ], "details": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.", "id": "GSD-2011-2919", "modified": "2023-12-13T01:19:07.087311Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.redhat.com/support/errata/RHSA-2011-1299.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" }, { "name": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=713478", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2919" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=713478", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "name": "RHSA-2011:1299", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" }, { "name": "[Spacewalk-announce-list] 20111222 Spacewalk 1.6 has been released", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:32Z", "publishedDate": "2014-02-05T18:55Z" } } }
RHSA-2011:1299
Vulnerability from csaf_redhat
Published
2011-09-15 17:43
Modified
2024-11-22 04:36
Summary
Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update
Notes
Topic
Updated packages that fix several security issues and add one enhancement
are now available for Red Hat Network Satellite 5.4.1 for Red Hat
Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Red Hat Network (RHN) Satellite provides a solution to organizations
requiring absolute control over and privacy of the maintenance and package
deployment of their servers. It allows organizations to utilize the
benefits of the Red Hat Network without having to provide public Internet
access to their servers or other client systems.
Multiple cross-site scripting (XSS) flaws were found in the RHN Satellite
web interface. A remote attacker could use these flaws to perform a
cross-site scripting attack against victims using the RHN Satellite web
interface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)
An open redirect flaw was found in the RHN Satellite web interface login
page. A remote attacker able to trick a victim to open the login page using
a specially-crafted link could redirect the victim to an arbitrary page
after they successfully log in. (CVE-2011-1594)
Red Hat would like to thank Daniel Karanja Muturi for reporting
CVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently
reporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;
Sylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE
Security Team for reporting CVE-2011-1594.
This update also adds the following enhancement:
* Session cookies set by RHN Satellite are now marked as HTTPOnly. This
setting helps reduce the impact of cross-site scripting flaws by
instructing the browser to disallow scripts access to those cookies.
(BZ#713477)
Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these
updated packages, which contain patches to correct these issues and add
this enhancement. For this update to take effect, Red Hat Network Satellite
must be restarted. Refer to the Solution section for details.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that fix several security issues and add one enhancement\nare now available for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Network (RHN) Satellite provides a solution to organizations\nrequiring absolute control over and privacy of the maintenance and package\ndeployment of their servers. It allows organizations to utilize the\nbenefits of the Red Hat Network without having to provide public Internet\naccess to their servers or other client systems.\n\nMultiple cross-site scripting (XSS) flaws were found in the RHN Satellite\nweb interface. A remote attacker could use these flaws to perform a\ncross-site scripting attack against victims using the RHN Satellite web\ninterface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)\n\nAn open redirect flaw was found in the RHN Satellite web interface login\npage. A remote attacker able to trick a victim to open the login page using\na specially-crafted link could redirect the victim to an arbitrary page\nafter they successfully log in. (CVE-2011-1594)\n\nRed Hat would like to thank Daniel Karanja Muturi for reporting\nCVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently\nreporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;\nSylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE\nSecurity Team for reporting CVE-2011-1594.\n\nThis update also adds the following enhancement:\n\n* Session cookies set by RHN Satellite are now marked as HTTPOnly. This\nsetting helps reduce the impact of cross-site scripting flaws by\ninstructing the browser to disallow scripts access to those cookies.\n(BZ#713477)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated packages, which contain patches to correct these issues and add\nthis enhancement. For this update to take effect, Red Hat Network Satellite\nmust be restarted. Refer to the Solution section for details.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1299", "url": "https://access.redhat.com/errata/RHSA-2011:1299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "672167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167" }, { "category": "external", "summary": "681032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032" }, { "category": "external", "summary": "713477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713477" }, { "category": "external", "summary": "713478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "category": "external", "summary": "730955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955" }, { "category": "external", "summary": "731647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1299.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:36:43+00:00", "generator": { "date": "2024-11-22T04:36:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1299", "initial_release_date": "2011-09-15T17:43:00+00:00", "revision_history": [ { "date": "2011-09-15T17:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-09-15T13:54:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:36:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product": { "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product_id": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product": { "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product_id": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el5sat.src", "product": { "name": "spacewalk-java-0:1.2.39-98.el5sat.src", "product_id": "spacewalk-java-0:1.2.39-98.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-web-0:1.2.7-20.el5sat.src", "product": { "name": "spacewalk-web-0:1.2.7-20.el5sat.src", "product_id": "spacewalk-web-0:1.2.7-20.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el5sat.src", "product": { "name": "spacewalk-config-0:1.2.2-7.el5sat.src", "product_id": "spacewalk-config-0:1.2.2-7.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el6sat.src", "product": { "name": "spacewalk-java-0:1.2.39-98.el6sat.src", "product_id": "spacewalk-java-0:1.2.39-98.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-web-0:1.2.7-20.el6sat.src", "product": { "name": "spacewalk-web-0:1.2.7-20.el6sat.src", "product_id": "spacewalk-web-0:1.2.7-20.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el6sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el6sat.src", "product": { "name": "spacewalk-config-0:1.2.2-7.el6sat.src", "product_id": "spacewalk-config-0:1.2.2-7.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch" }, "product_reference": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src" }, "product_reference": "spacewalk-config-0:1.2.2-7.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src" }, "product_reference": "spacewalk-java-0:1.2.39-98.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-web-0:1.2.7-20.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src" }, "product_reference": "spacewalk-web-0:1.2.7-20.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch" }, "product_reference": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src" }, "product_reference": "spacewalk-config-0:1.2.2-7.el6sat.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src" }, "product_reference": "spacewalk-java-0:1.2.39-98.el6sat.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-web-0:1.2.7-20.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" }, "product_reference": "spacewalk-web-0:1.2.7-20.el6sat.src", "relates_to_product_reference": "6Server-Satellite" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Thomas Biege" ], "organization": "SuSE Security Team" } ], "cve": "CVE-2011-1594", "discovery_date": "2011-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "672167" } ], "notes": [ { "category": "description", "text": "Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spacewalk: login page open redirect via url_bounce", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1594" }, { "category": "external", "summary": "RHBZ#672167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1594", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594" } ], "release_date": "2011-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Spacewalk: login page open redirect via url_bounce" }, { "acknowledgments": [ { "names": [ "Daniel Karanja Muturi" ] } ], "cve": "CVE-2011-2919", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "713478" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spacewalk: XSS on SystemGroupList.do page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2919" }, { "category": "external", "summary": "RHBZ#713478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2919", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Spacewalk: XSS on SystemGroupList.do page" }, { "acknowledgments": [ { "names": [ "Nils Juenemann", "The Bearded Warriors" ] } ], "cve": "CVE-2011-2920", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "681032" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: XSS flaw(s) in filter handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2920" }, { "category": "external", "summary": "RHBZ#681032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2920", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: XSS flaw(s) in filter handling" }, { "acknowledgments": [ { "names": [ "Nils Juenemann" ] } ], "cve": "CVE-2011-2927", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "730955" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite/Spacewalk: XSS flaw in channels search", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2927" }, { "category": "external", "summary": "RHBZ#730955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2927", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite/Spacewalk: XSS flaw in channels search" }, { "acknowledgments": [ { "names": [ "Sylvain Maes" ] } ], "cve": "CVE-2011-3344", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "731647" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite/Spacewalk: XSS on the Lost Password page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3344" }, { "category": "external", "summary": "RHBZ#731647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3344", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite/Spacewalk: XSS on the Lost Password page" } ] }
rhsa-2011_1299
Vulnerability from csaf_redhat
Published
2011-09-15 17:43
Modified
2024-11-22 04:36
Summary
Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update
Notes
Topic
Updated packages that fix several security issues and add one enhancement
are now available for Red Hat Network Satellite 5.4.1 for Red Hat
Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Red Hat Network (RHN) Satellite provides a solution to organizations
requiring absolute control over and privacy of the maintenance and package
deployment of their servers. It allows organizations to utilize the
benefits of the Red Hat Network without having to provide public Internet
access to their servers or other client systems.
Multiple cross-site scripting (XSS) flaws were found in the RHN Satellite
web interface. A remote attacker could use these flaws to perform a
cross-site scripting attack against victims using the RHN Satellite web
interface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)
An open redirect flaw was found in the RHN Satellite web interface login
page. A remote attacker able to trick a victim to open the login page using
a specially-crafted link could redirect the victim to an arbitrary page
after they successfully log in. (CVE-2011-1594)
Red Hat would like to thank Daniel Karanja Muturi for reporting
CVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently
reporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;
Sylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE
Security Team for reporting CVE-2011-1594.
This update also adds the following enhancement:
* Session cookies set by RHN Satellite are now marked as HTTPOnly. This
setting helps reduce the impact of cross-site scripting flaws by
instructing the browser to disallow scripts access to those cookies.
(BZ#713477)
Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these
updated packages, which contain patches to correct these issues and add
this enhancement. For this update to take effect, Red Hat Network Satellite
must be restarted. Refer to the Solution section for details.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that fix several security issues and add one enhancement\nare now available for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Network (RHN) Satellite provides a solution to organizations\nrequiring absolute control over and privacy of the maintenance and package\ndeployment of their servers. It allows organizations to utilize the\nbenefits of the Red Hat Network without having to provide public Internet\naccess to their servers or other client systems.\n\nMultiple cross-site scripting (XSS) flaws were found in the RHN Satellite\nweb interface. A remote attacker could use these flaws to perform a\ncross-site scripting attack against victims using the RHN Satellite web\ninterface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)\n\nAn open redirect flaw was found in the RHN Satellite web interface login\npage. A remote attacker able to trick a victim to open the login page using\na specially-crafted link could redirect the victim to an arbitrary page\nafter they successfully log in. (CVE-2011-1594)\n\nRed Hat would like to thank Daniel Karanja Muturi for reporting\nCVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently\nreporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;\nSylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE\nSecurity Team for reporting CVE-2011-1594.\n\nThis update also adds the following enhancement:\n\n* Session cookies set by RHN Satellite are now marked as HTTPOnly. This\nsetting helps reduce the impact of cross-site scripting flaws by\ninstructing the browser to disallow scripts access to those cookies.\n(BZ#713477)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated packages, which contain patches to correct these issues and add\nthis enhancement. For this update to take effect, Red Hat Network Satellite\nmust be restarted. Refer to the Solution section for details.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1299", "url": "https://access.redhat.com/errata/RHSA-2011:1299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "672167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167" }, { "category": "external", "summary": "681032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032" }, { "category": "external", "summary": "713477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713477" }, { "category": "external", "summary": "713478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "category": "external", "summary": "730955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955" }, { "category": "external", "summary": "731647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1299.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:36:43+00:00", "generator": { "date": "2024-11-22T04:36:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1299", "initial_release_date": "2011-09-15T17:43:00+00:00", "revision_history": [ { "date": "2011-09-15T17:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-09-15T13:54:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:36:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product": { "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product_id": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product": { "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product_id": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el5sat.src", "product": { "name": "spacewalk-java-0:1.2.39-98.el5sat.src", "product_id": "spacewalk-java-0:1.2.39-98.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-web-0:1.2.7-20.el5sat.src", "product": { "name": "spacewalk-web-0:1.2.7-20.el5sat.src", "product_id": "spacewalk-web-0:1.2.7-20.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el5sat.src", "product": { "name": "spacewalk-config-0:1.2.2-7.el5sat.src", "product_id": "spacewalk-config-0:1.2.2-7.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el6sat.src", "product": { "name": "spacewalk-java-0:1.2.39-98.el6sat.src", "product_id": "spacewalk-java-0:1.2.39-98.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-web-0:1.2.7-20.el6sat.src", "product": { "name": "spacewalk-web-0:1.2.7-20.el6sat.src", "product_id": "spacewalk-web-0:1.2.7-20.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el6sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el6sat.src", "product": { "name": "spacewalk-config-0:1.2.2-7.el6sat.src", "product_id": "spacewalk-config-0:1.2.2-7.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch" }, "product_reference": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src" }, "product_reference": "spacewalk-config-0:1.2.2-7.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src" }, "product_reference": "spacewalk-java-0:1.2.39-98.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-web-0:1.2.7-20.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src" }, "product_reference": "spacewalk-web-0:1.2.7-20.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch" }, "product_reference": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src" }, "product_reference": "spacewalk-config-0:1.2.2-7.el6sat.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src" }, "product_reference": "spacewalk-java-0:1.2.39-98.el6sat.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-web-0:1.2.7-20.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" }, "product_reference": "spacewalk-web-0:1.2.7-20.el6sat.src", "relates_to_product_reference": "6Server-Satellite" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Thomas Biege" ], "organization": "SuSE Security Team" } ], "cve": "CVE-2011-1594", "discovery_date": "2011-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "672167" } ], "notes": [ { "category": "description", "text": "Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spacewalk: login page open redirect via url_bounce", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1594" }, { "category": "external", "summary": "RHBZ#672167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1594", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594" } ], "release_date": "2011-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Spacewalk: login page open redirect via url_bounce" }, { "acknowledgments": [ { "names": [ "Daniel Karanja Muturi" ] } ], "cve": "CVE-2011-2919", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "713478" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spacewalk: XSS on SystemGroupList.do page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2919" }, { "category": "external", "summary": "RHBZ#713478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2919", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Spacewalk: XSS on SystemGroupList.do page" }, { "acknowledgments": [ { "names": [ "Nils Juenemann", "The Bearded Warriors" ] } ], "cve": "CVE-2011-2920", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "681032" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: XSS flaw(s) in filter handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2920" }, { "category": "external", "summary": "RHBZ#681032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2920", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: XSS flaw(s) in filter handling" }, { "acknowledgments": [ { "names": [ "Nils Juenemann" ] } ], "cve": "CVE-2011-2927", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "730955" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite/Spacewalk: XSS flaw in channels search", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2927" }, { "category": "external", "summary": "RHBZ#730955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2927", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite/Spacewalk: XSS flaw in channels search" }, { "acknowledgments": [ { "names": [ "Sylvain Maes" ] } ], "cve": "CVE-2011-3344", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "731647" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite/Spacewalk: XSS on the Lost Password page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3344" }, { "category": "external", "summary": "RHBZ#731647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3344", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite/Spacewalk: XSS on the Lost Password page" } ] }
rhsa-2011:1299
Vulnerability from csaf_redhat
Published
2011-09-15 17:43
Modified
2024-11-22 04:36
Summary
Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update
Notes
Topic
Updated packages that fix several security issues and add one enhancement
are now available for Red Hat Network Satellite 5.4.1 for Red Hat
Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Red Hat Network (RHN) Satellite provides a solution to organizations
requiring absolute control over and privacy of the maintenance and package
deployment of their servers. It allows organizations to utilize the
benefits of the Red Hat Network without having to provide public Internet
access to their servers or other client systems.
Multiple cross-site scripting (XSS) flaws were found in the RHN Satellite
web interface. A remote attacker could use these flaws to perform a
cross-site scripting attack against victims using the RHN Satellite web
interface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)
An open redirect flaw was found in the RHN Satellite web interface login
page. A remote attacker able to trick a victim to open the login page using
a specially-crafted link could redirect the victim to an arbitrary page
after they successfully log in. (CVE-2011-1594)
Red Hat would like to thank Daniel Karanja Muturi for reporting
CVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently
reporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;
Sylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE
Security Team for reporting CVE-2011-1594.
This update also adds the following enhancement:
* Session cookies set by RHN Satellite are now marked as HTTPOnly. This
setting helps reduce the impact of cross-site scripting flaws by
instructing the browser to disallow scripts access to those cookies.
(BZ#713477)
Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these
updated packages, which contain patches to correct these issues and add
this enhancement. For this update to take effect, Red Hat Network Satellite
must be restarted. Refer to the Solution section for details.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that fix several security issues and add one enhancement\nare now available for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Network (RHN) Satellite provides a solution to organizations\nrequiring absolute control over and privacy of the maintenance and package\ndeployment of their servers. It allows organizations to utilize the\nbenefits of the Red Hat Network without having to provide public Internet\naccess to their servers or other client systems.\n\nMultiple cross-site scripting (XSS) flaws were found in the RHN Satellite\nweb interface. A remote attacker could use these flaws to perform a\ncross-site scripting attack against victims using the RHN Satellite web\ninterface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)\n\nAn open redirect flaw was found in the RHN Satellite web interface login\npage. A remote attacker able to trick a victim to open the login page using\na specially-crafted link could redirect the victim to an arbitrary page\nafter they successfully log in. (CVE-2011-1594)\n\nRed Hat would like to thank Daniel Karanja Muturi for reporting\nCVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently\nreporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;\nSylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE\nSecurity Team for reporting CVE-2011-1594.\n\nThis update also adds the following enhancement:\n\n* Session cookies set by RHN Satellite are now marked as HTTPOnly. This\nsetting helps reduce the impact of cross-site scripting flaws by\ninstructing the browser to disallow scripts access to those cookies.\n(BZ#713477)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated packages, which contain patches to correct these issues and add\nthis enhancement. For this update to take effect, Red Hat Network Satellite\nmust be restarted. Refer to the Solution section for details.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1299", "url": "https://access.redhat.com/errata/RHSA-2011:1299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "672167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167" }, { "category": "external", "summary": "681032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032" }, { "category": "external", "summary": "713477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713477" }, { "category": "external", "summary": "713478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "category": "external", "summary": "730955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955" }, { "category": "external", "summary": "731647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1299.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:36:43+00:00", "generator": { "date": "2024-11-22T04:36:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1299", "initial_release_date": "2011-09-15T17:43:00+00:00", "revision_history": [ { "date": "2011-09-15T17:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-09-15T13:54:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:36:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product": { "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product_id": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product": { "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product_id": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product": { "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product_id": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product": { "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product_id": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product": { "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product_id": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product": { "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product_id": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el5sat.src", "product": { "name": "spacewalk-java-0:1.2.39-98.el5sat.src", "product_id": "spacewalk-java-0:1.2.39-98.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-web-0:1.2.7-20.el5sat.src", "product": { "name": "spacewalk-web-0:1.2.7-20.el5sat.src", "product_id": "spacewalk-web-0:1.2.7-20.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el5sat.src", "product": { "name": "spacewalk-config-0:1.2.2-7.el5sat.src", "product_id": "spacewalk-config-0:1.2.2-7.el5sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-java-0:1.2.39-98.el6sat.src", "product": { "name": "spacewalk-java-0:1.2.39-98.el6sat.src", "product_id": "spacewalk-java-0:1.2.39-98.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-web-0:1.2.7-20.el6sat.src", "product": { "name": "spacewalk-web-0:1.2.7-20.el6sat.src", "product_id": "spacewalk-web-0:1.2.7-20.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el6sat?arch=src" } } }, { "category": "product_version", "name": "spacewalk-config-0:1.2.2-7.el6sat.src", "product": { "name": "spacewalk-config-0:1.2.2-7.el6sat.src", "product_id": "spacewalk-config-0:1.2.2-7.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-base-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch" }, "product_reference": "spacewalk-config-0:1.2.2-7.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src" }, "product_reference": "spacewalk-config-0:1.2.2-7.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-grail-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-html-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src" }, "product_reference": "spacewalk-java-0:1.2.39-98.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch" }, "product_reference": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-web-0:1.2.7-20.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src" }, "product_reference": "spacewalk-web-0:1.2.7-20.el5sat.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-base-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch" }, "product_reference": "spacewalk-config-0:1.2.2-7.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-0:1.2.2-7.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src" }, "product_reference": "spacewalk-config-0:1.2.2-7.el6sat.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-grail-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-html-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:1.2.39-98.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src" }, "product_reference": "spacewalk-java-0:1.2.39-98.el6sat.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch" }, "product_reference": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-web-0:1.2.7-20.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" }, "product_reference": "spacewalk-web-0:1.2.7-20.el6sat.src", "relates_to_product_reference": "6Server-Satellite" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Thomas Biege" ], "organization": "SuSE Security Team" } ], "cve": "CVE-2011-1594", "discovery_date": "2011-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "672167" } ], "notes": [ { "category": "description", "text": "Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spacewalk: login page open redirect via url_bounce", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1594" }, { "category": "external", "summary": "RHBZ#672167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1594", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594" } ], "release_date": "2011-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Spacewalk: login page open redirect via url_bounce" }, { "acknowledgments": [ { "names": [ "Daniel Karanja Muturi" ] } ], "cve": "CVE-2011-2919", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "713478" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spacewalk: XSS on SystemGroupList.do page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2919" }, { "category": "external", "summary": "RHBZ#713478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2919", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Spacewalk: XSS on SystemGroupList.do page" }, { "acknowledgments": [ { "names": [ "Nils Juenemann", "The Bearded Warriors" ] } ], "cve": "CVE-2011-2920", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "681032" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: XSS flaw(s) in filter handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2920" }, { "category": "external", "summary": "RHBZ#681032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2920", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: XSS flaw(s) in filter handling" }, { "acknowledgments": [ { "names": [ "Nils Juenemann" ] } ], "cve": "CVE-2011-2927", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "730955" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite/Spacewalk: XSS flaw in channels search", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2927" }, { "category": "external", "summary": "RHBZ#730955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2927", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite/Spacewalk: XSS flaw in channels search" }, { "acknowledgments": [ { "names": [ "Sylvain Maes" ] } ], "cve": "CVE-2011-3344", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2011-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "731647" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite/Spacewalk: XSS on the Lost Password page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3344" }, { "category": "external", "summary": "RHBZ#731647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3344", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344" } ], "release_date": "2011-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-15T17:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch", "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src", "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src", "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch", "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch", "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src", "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch", "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src", "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src", "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch", "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch", "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite/Spacewalk: XSS on the Lost Password page" } ] }
ghsa-7vjr-395v-c89g
Vulnerability from github
Published
2022-05-17 04:52
Modified
2022-05-17 04:52
Details
Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.
{ "affected": [], "aliases": [ "CVE-2011-2919" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-02-05T18:55:00Z", "severity": "MODERATE" }, "details": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.", "id": "GHSA-7vjr-395v-c89g", "modified": "2022-05-17T04:52:04Z", "published": "2022-05-17T04:52:04Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:1299" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2011-2919" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478" }, { "type": "WEB", "url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.