Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2920 (GCVE-0-2011-2920)
Vulnerability from cvelistv5 – Published: 2014-02-05 18:00 – Updated: 2024-08-06 23:15- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:31.836Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[Spacewalk-announce-list] 20111222 Spacewalk 1.6 has been released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
},
{
"name": "RHSA-2011:1299",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-02-05T17:57:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[Spacewalk-announce-list] 20111222 Spacewalk 1.6 has been released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
},
{
"name": "RHSA-2011:1299",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2920",
"datePublished": "2014-02-05T18:00:00",
"dateReserved": "2011-07-27T00:00:00",
"dateUpdated": "2024-08-06T23:15:31.836Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"181F4E02-1FFA-4EFD-9DBF-3E23EFC200AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F66E06D8-78D7-492A-992C-8A70B5C36A97\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \\\"Filter by Synopsis\\\" field and other unspecified filter forms.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de XSS en Spacewalk 1.6, utilizado en Red Hat Network (RHN) Satellite, permiten a atacantes remotos inyectar script Web o HTML arbitrario a trav\\u00e9s del campo \\\"Filter by Synopsis\\\" y otros filtros de formularios no especificados.\"}]",
"id": "CVE-2011-2920",
"lastModified": "2024-11-21T01:29:16.803",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-02-05T18:55:05.957",
"references": "[{\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1299.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=681032\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1299.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=681032\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2920\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-02-05T18:55:05.957\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \\\"Filter by Synopsis\\\" field and other unspecified filter forms.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de XSS en Spacewalk 1.6, utilizado en Red Hat Network (RHN) Satellite, permiten a atacantes remotos inyectar script Web o HTML arbitrario a trav\u00e9s del campo \\\"Filter by Synopsis\\\" y otros filtros de formularios no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"181F4E02-1FFA-4EFD-9DBF-3E23EFC200AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66E06D8-78D7-492A-992C-8A70B5C36A97\"}]}]}],\"references\":[{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1299.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=681032\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1299.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=681032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
RHSA-2011_1299
Vulnerability from csaf_redhat - Published: 2011-09-15 17:43 - Updated: 2024-11-22 04:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that fix several security issues and add one enhancement\nare now available for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Network (RHN) Satellite provides a solution to organizations\nrequiring absolute control over and privacy of the maintenance and package\ndeployment of their servers. It allows organizations to utilize the\nbenefits of the Red Hat Network without having to provide public Internet\naccess to their servers or other client systems.\n\nMultiple cross-site scripting (XSS) flaws were found in the RHN Satellite\nweb interface. A remote attacker could use these flaws to perform a\ncross-site scripting attack against victims using the RHN Satellite web\ninterface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)\n\nAn open redirect flaw was found in the RHN Satellite web interface login\npage. A remote attacker able to trick a victim to open the login page using\na specially-crafted link could redirect the victim to an arbitrary page\nafter they successfully log in. (CVE-2011-1594)\n\nRed Hat would like to thank Daniel Karanja Muturi for reporting\nCVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently\nreporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;\nSylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE\nSecurity Team for reporting CVE-2011-1594.\n\nThis update also adds the following enhancement:\n\n* Session cookies set by RHN Satellite are now marked as HTTPOnly. This\nsetting helps reduce the impact of cross-site scripting flaws by\ninstructing the browser to disallow scripts access to those cookies.\n(BZ#713477)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated packages, which contain patches to correct these issues and add\nthis enhancement. For this update to take effect, Red Hat Network Satellite\nmust be restarted. Refer to the Solution section for details.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1299",
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "672167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167"
},
{
"category": "external",
"summary": "681032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"category": "external",
"summary": "713477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713477"
},
{
"category": "external",
"summary": "713478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478"
},
{
"category": "external",
"summary": "730955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955"
},
{
"category": "external",
"summary": "731647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1299.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T04:36:43+00:00",
"generator": {
"date": "2024-11-22T04:36:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1299",
"initial_release_date": "2011-09-15T17:43:00+00:00",
"revision_history": [
{
"date": "2011-09-15T17:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-15T13:54:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:36:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"product_id": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"product_id": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el5sat.src",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.src",
"product_id": "spacewalk-java-0:1.2.39-98.el5sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-web-0:1.2.7-20.el5sat.src",
"product": {
"name": "spacewalk-web-0:1.2.7-20.el5sat.src",
"product_id": "spacewalk-web-0:1.2.7-20.el5sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el5sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el5sat.src",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.src",
"product_id": "spacewalk-config-0:1.2.2-7.el5sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el6sat.src",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.src",
"product_id": "spacewalk-java-0:1.2.39-98.el6sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-web-0:1.2.7-20.el6sat.src",
"product": {
"name": "spacewalk-web-0:1.2.7-20.el6sat.src",
"product_id": "spacewalk-web-0:1.2.7-20.el6sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el6sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el6sat.src",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.src",
"product_id": "spacewalk-config-0:1.2.2-7.el6sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el5sat.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el5sat.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-web-0:1.2.7-20.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src"
},
"product_reference": "spacewalk-web-0:1.2.7-20.el5sat.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el6sat.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el6sat.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-web-0:1.2.7-20.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
},
"product_reference": "spacewalk-web-0:1.2.7-20.el6sat.src",
"relates_to_product_reference": "6Server-Satellite"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Thomas Biege"
],
"organization": "SuSE Security Team"
}
],
"cve": "CVE-2011-1594",
"discovery_date": "2011-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "672167"
}
],
"notes": [
{
"category": "description",
"text": "Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Spacewalk: login page open redirect via url_bounce",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1594"
},
{
"category": "external",
"summary": "RHBZ#672167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594"
}
],
"release_date": "2011-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Spacewalk: login page open redirect via url_bounce"
},
{
"acknowledgments": [
{
"names": [
"Daniel Karanja Muturi"
]
}
],
"cve": "CVE-2011-2919",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "713478"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Spacewalk: XSS on SystemGroupList.do page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2919"
},
{
"category": "external",
"summary": "RHBZ#713478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Spacewalk: XSS on SystemGroupList.do page"
},
{
"acknowledgments": [
{
"names": [
"Nils Juenemann",
"The Bearded Warriors"
]
}
],
"cve": "CVE-2011-2920",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681032"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Satellite: XSS flaw(s) in filter handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2920"
},
{
"category": "external",
"summary": "RHBZ#681032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2920",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Satellite: XSS flaw(s) in filter handling"
},
{
"acknowledgments": [
{
"names": [
"Nils Juenemann"
]
}
],
"cve": "CVE-2011-2927",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-08-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "730955"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Satellite/Spacewalk: XSS flaw in channels search",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2927"
},
{
"category": "external",
"summary": "RHBZ#730955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2927",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Satellite/Spacewalk: XSS flaw in channels search"
},
{
"acknowledgments": [
{
"names": [
"Sylvain Maes"
]
}
],
"cve": "CVE-2011-3344",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "731647"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Satellite/Spacewalk: XSS on the Lost Password page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3344"
},
{
"category": "external",
"summary": "RHBZ#731647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Satellite/Spacewalk: XSS on the Lost Password page"
}
]
}
RHSA-2011:1299
Vulnerability from csaf_redhat - Published: 2011-09-15 17:43 - Updated: 2025-11-21 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that fix several security issues and add one enhancement\nare now available for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Network (RHN) Satellite provides a solution to organizations\nrequiring absolute control over and privacy of the maintenance and package\ndeployment of their servers. It allows organizations to utilize the\nbenefits of the Red Hat Network without having to provide public Internet\naccess to their servers or other client systems.\n\nMultiple cross-site scripting (XSS) flaws were found in the RHN Satellite\nweb interface. A remote attacker could use these flaws to perform a\ncross-site scripting attack against victims using the RHN Satellite web\ninterface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)\n\nAn open redirect flaw was found in the RHN Satellite web interface login\npage. A remote attacker able to trick a victim to open the login page using\na specially-crafted link could redirect the victim to an arbitrary page\nafter they successfully log in. (CVE-2011-1594)\n\nRed Hat would like to thank Daniel Karanja Muturi for reporting\nCVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently\nreporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;\nSylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE\nSecurity Team for reporting CVE-2011-1594.\n\nThis update also adds the following enhancement:\n\n* Session cookies set by RHN Satellite are now marked as HTTPOnly. This\nsetting helps reduce the impact of cross-site scripting flaws by\ninstructing the browser to disallow scripts access to those cookies.\n(BZ#713477)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated packages, which contain patches to correct these issues and add\nthis enhancement. For this update to take effect, Red Hat Network Satellite\nmust be restarted. Refer to the Solution section for details.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1299",
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "672167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167"
},
{
"category": "external",
"summary": "681032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"category": "external",
"summary": "713477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713477"
},
{
"category": "external",
"summary": "713478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478"
},
{
"category": "external",
"summary": "730955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955"
},
{
"category": "external",
"summary": "731647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1299.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:38:53+00:00",
"generator": {
"date": "2025-11-21T17:38:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1299",
"initial_release_date": "2011-09-15T17:43:00+00:00",
"revision_history": [
{
"date": "2011-09-15T17:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-15T13:54:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:38:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"product_id": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"product": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"product_id": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"product_id": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-config@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-taskomatic@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-lib@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java-oracle@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"product_id": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-sniglets@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-dobby@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-grail@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-pxt@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-base-minimal@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"product": {
"name": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"product_id": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-html@1.2.7-20.el6sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"product_id": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el5sat.src",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.src",
"product_id": "spacewalk-java-0:1.2.39-98.el5sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el5sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-web-0:1.2.7-20.el5sat.src",
"product": {
"name": "spacewalk-web-0:1.2.7-20.el5sat.src",
"product_id": "spacewalk-web-0:1.2.7-20.el5sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el5sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el5sat.src",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.src",
"product_id": "spacewalk-config-0:1.2.2-7.el5sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el5sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-java-0:1.2.39-98.el6sat.src",
"product": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.src",
"product_id": "spacewalk-java-0:1.2.39-98.el6sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-java@1.2.39-98.el6sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-web-0:1.2.7-20.el6sat.src",
"product": {
"name": "spacewalk-web-0:1.2.7-20.el6sat.src",
"product_id": "spacewalk-web-0:1.2.7-20.el6sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-web@1.2.7-20.el6sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "spacewalk-config-0:1.2.2-7.el6sat.src",
"product": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.src",
"product_id": "spacewalk-config-0:1.2.2-7.el6sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/spacewalk-config@1.2.2-7.el6sat?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-base-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el5sat.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-grail-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-html-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el5sat.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch"
},
"product_reference": "spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch"
},
"product_reference": "spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-web-0:1.2.7-20.el5sat.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src"
},
"product_reference": "spacewalk-web-0:1.2.7-20.el5sat.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-base-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-0:1.2.2-7.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src"
},
"product_reference": "spacewalk-config-0:1.2.2-7.el6sat.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-grail-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-html-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-0:1.2.39-98.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src"
},
"product_reference": "spacewalk-java-0:1.2.39-98.el6sat.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch"
},
"product_reference": "spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch"
},
"product_reference": "spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-web-0:1.2.7-20.el6sat.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
},
"product_reference": "spacewalk-web-0:1.2.7-20.el6sat.src",
"relates_to_product_reference": "6Server-Satellite"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Thomas Biege"
],
"organization": "SuSE Security Team"
}
],
"cve": "CVE-2011-1594",
"discovery_date": "2011-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "672167"
}
],
"notes": [
{
"category": "description",
"text": "Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Spacewalk: login page open redirect via url_bounce",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1594"
},
{
"category": "external",
"summary": "RHBZ#672167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=672167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1594"
}
],
"release_date": "2011-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Spacewalk: login page open redirect via url_bounce"
},
{
"acknowledgments": [
{
"names": [
"Daniel Karanja Muturi"
]
}
],
"cve": "CVE-2011-2919",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "713478"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Spacewalk: XSS on SystemGroupList.do page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2919"
},
{
"category": "external",
"summary": "RHBZ#713478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713478"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2919"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Spacewalk: XSS on SystemGroupList.do page"
},
{
"acknowledgments": [
{
"names": [
"Nils Juenemann",
"The Bearded Warriors"
]
}
],
"cve": "CVE-2011-2920",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681032"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Satellite: XSS flaw(s) in filter handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2920"
},
{
"category": "external",
"summary": "RHBZ#681032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2920",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Satellite: XSS flaw(s) in filter handling"
},
{
"acknowledgments": [
{
"names": [
"Nils Juenemann"
]
}
],
"cve": "CVE-2011-2927",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-08-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "730955"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Satellite/Spacewalk: XSS flaw in channels search",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2927"
},
{
"category": "external",
"summary": "RHBZ#730955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730955"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2927",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2927"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Satellite/Spacewalk: XSS flaw in channels search"
},
{
"acknowledgments": [
{
"names": [
"Sylvain Maes"
]
}
],
"cve": "CVE-2011-3344",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "731647"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Satellite/Spacewalk: XSS on the Lost Password page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3344"
},
{
"category": "external",
"summary": "RHBZ#731647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3344"
}
],
"release_date": "2011-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart",
"product_ids": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:spacewalk-base-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-base-minimal-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.noarch",
"5Server-Satellite54:spacewalk-config-0:1.2.2-7.el5sat.src",
"5Server-Satellite54:spacewalk-dobby-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-grail-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-html-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-0:1.2.39-98.el5sat.src",
"5Server-Satellite54:spacewalk-java-config-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-lib-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-java-oracle-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-pxt-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-sniglets-0:1.2.7-20.el5sat.noarch",
"5Server-Satellite54:spacewalk-taskomatic-0:1.2.39-98.el5sat.noarch",
"5Server-Satellite54:spacewalk-web-0:1.2.7-20.el5sat.src",
"6Server-Satellite:spacewalk-base-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-base-minimal-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.noarch",
"6Server-Satellite:spacewalk-config-0:1.2.2-7.el6sat.src",
"6Server-Satellite:spacewalk-dobby-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-grail-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-html-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-0:1.2.39-98.el6sat.src",
"6Server-Satellite:spacewalk-java-config-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-lib-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-java-oracle-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-pxt-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-sniglets-0:1.2.7-20.el6sat.noarch",
"6Server-Satellite:spacewalk-taskomatic-0:1.2.39-98.el6sat.noarch",
"6Server-Satellite:spacewalk-web-0:1.2.7-20.el6sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Satellite/Spacewalk: XSS on the Lost Password page"
}
]
}
GSD-2011-2920
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2920",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.",
"id": "GSD-2011-2920",
"references": [
"https://www.suse.com/security/cve/CVE-2011-2920.html",
"https://access.redhat.com/errata/RHSA-2011:1299"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2920"
],
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.",
"id": "GSD-2011-2920",
"modified": "2023-12-13T01:19:06.653438Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2920",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-1299.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
},
{
"name": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681032",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2920"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2011:1299",
"refsource": "REDHAT",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
},
{
"name": "[Spacewalk-announce-list] 20111222 Spacewalk 1.6 has been released",
"refsource": "MLIST",
"tags": [
"Vendor Advisory"
],
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681032",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T04:32Z",
"publishedDate": "2014-02-05T18:55Z"
}
}
}
CERTA-2011-AVI-525
Vulnerability from certfr_avis - Published: - Updated:
Des vulnérabilités de type injection de code indirecte à distance (XSS) ont été identifiées, ainsi qu'une vulnérabilité permettant, à partir de la page de connexion, de rediriger l'utilisateur vers une page Web arbitraire.
Description
Ces vulnérabilités peuvent être utilisées par une personne intentionnée distante pour :
- effectuer des injections de code indirecte à distance (XSS) ;
- rediriger l'utilisateur vers une page Web arbitraire suite à une connexion réussie.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Network Satellite version 5.4 pour RHEL 5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Network Satellite version 5.4 pour RHEL 6.",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nCes vuln\u00e9rabilit\u00e9s peuvent \u00eatre utilis\u00e9es par une personne intentionn\u00e9e\ndistante pour :\n\n- effectuer des injections de code indirecte \u00e0 distance (XSS) ;\n- rediriger l\u0027utilisateur vers une page Web arbitraire suite \u00e0 une\n connexion r\u00e9ussie.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2919"
},
{
"name": "CVE-2011-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3344"
},
{
"name": "CVE-2011-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1594"
},
{
"name": "CVE-2011-2920",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2920"
},
{
"name": "CVE-2011-2927",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2927"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2011:1299-1 du 19 septembre 2011 :",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1299.html"
}
],
"reference": "CERTA-2011-AVI-525",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Des vuln\u00e9rabilit\u00e9s de type injection de code indirecte \u00e0 distance (\u003cspan\nclass=\"textit\"\u003eXSS\u003c/span\u003e) ont \u00e9t\u00e9 identifi\u00e9es, ainsi qu\u0027une\nvuln\u00e9rabilit\u00e9 permettant, \u00e0 partir de la page de connexion, de rediriger\nl\u0027utilisateur vers une page Web arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Red Hat Network Satellite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 de Red Hat RHSA-2011:1299-1 du 15 septembre 2011",
"url": null
}
]
}
CERTA-2011-AVI-525
Vulnerability from certfr_avis - Published: - Updated:
Des vulnérabilités de type injection de code indirecte à distance (XSS) ont été identifiées, ainsi qu'une vulnérabilité permettant, à partir de la page de connexion, de rediriger l'utilisateur vers une page Web arbitraire.
Description
Ces vulnérabilités peuvent être utilisées par une personne intentionnée distante pour :
- effectuer des injections de code indirecte à distance (XSS) ;
- rediriger l'utilisateur vers une page Web arbitraire suite à une connexion réussie.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Network Satellite version 5.4 pour RHEL 5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Network Satellite version 5.4 pour RHEL 6.",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nCes vuln\u00e9rabilit\u00e9s peuvent \u00eatre utilis\u00e9es par une personne intentionn\u00e9e\ndistante pour :\n\n- effectuer des injections de code indirecte \u00e0 distance (XSS) ;\n- rediriger l\u0027utilisateur vers une page Web arbitraire suite \u00e0 une\n connexion r\u00e9ussie.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2919"
},
{
"name": "CVE-2011-3344",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3344"
},
{
"name": "CVE-2011-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1594"
},
{
"name": "CVE-2011-2920",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2920"
},
{
"name": "CVE-2011-2927",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2927"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2011:1299-1 du 19 septembre 2011 :",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1299.html"
}
],
"reference": "CERTA-2011-AVI-525",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Des vuln\u00e9rabilit\u00e9s de type injection de code indirecte \u00e0 distance (\u003cspan\nclass=\"textit\"\u003eXSS\u003c/span\u003e) ont \u00e9t\u00e9 identifi\u00e9es, ainsi qu\u0027une\nvuln\u00e9rabilit\u00e9 permettant, \u00e0 partir de la page de connexion, de rediriger\nl\u0027utilisateur vers une page Web arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Red Hat Network Satellite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 de Red Hat RHSA-2011:1299-1 du 15 septembre 2011",
"url": null
}
]
}
FKIE_CVE-2011-2920
Vulnerability from fkie_nvd - Published: 2014-02-05 18:55 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| redhat | network_satellite | - | |
| redhat | spacewalk | 1.6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:network_satellite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "181F4E02-1FFA-4EFD-9DBF-3E23EFC200AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:spacewalk:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F66E06D8-78D7-492A-992C-8A70B5C36A97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de XSS en Spacewalk 1.6, utilizado en Red Hat Network (RHN) Satellite, permiten a atacantes remotos inyectar script Web o HTML arbitrario a trav\u00e9s del campo \"Filter by Synopsis\" y otros filtros de formularios no especificados."
}
],
"id": "CVE-2011-2920",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-02-05T18:55:05.957",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-PQP9-2CMP-FX98
Vulnerability from github – Published: 2022-05-17 04:51 – Updated: 2022-05-17 04:51Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the "Filter by Synopsis" field and other unspecified filter forms.
{
"affected": [],
"aliases": [
"CVE-2011-2920"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-02-05T18:55:00Z",
"severity": "MODERATE"
},
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the \"Filter by Synopsis\" field and other unspecified filter forms.",
"id": "GHSA-pqp9-2cmp-fx98",
"modified": "2022-05-17T04:51:45Z",
"published": "2022-05-17T04:51:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2920"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2011:1299"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2011-2920"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681032"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/spacewalk-announce-list/2011-December/msg00000.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1299.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.