Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2016-3079
Vulnerability from cvelistv5
Published
2016-04-14 14:00
Modified
2024-08-05 23:40
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:15.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "name": "RHSA-2016:0590", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-14T13:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "name": "RHSA-2016:0590", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3079", "datePublished": "2016-04-14T14:00:00", "dateReserved": "2016-03-10T00:00:00", "dateUpdated": "2024-08-05T23:40:15.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85EA16E0-9261-45C4-840F-5366E9EAC5E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:spacewalk-java:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB6F3D1C-DDF1-49B6-8E4D-38B037F33030\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de XSS en la Web UI en Spacewalk y Red Hat Satellite 5.7 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\\u00e9s de (1) PATH_INFO en systems/SystemEntitlements.do; (2) el par\\u00e1metro label en admin/multiorg/EntitlementDetails.do; o el nombre de (3) una etiqueta snapshot o (4) un grupo de sistema en System Set Manager (SSM).\"}]", "id": "CVE-2016-3079", "lastModified": "2024-11-21T02:49:19.253", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2016-04-14T14:59:08.177", "references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0590.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1320444\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1320452\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1320940\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/7920542f\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/982b11c9\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/b6491eba\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-0590.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1320444\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1320452\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1320940\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/7920542f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/982b11c9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/spacewalkproject/spacewalk/commit/b6491eba\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2016-3079\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-04-14T14:59:08.177\",\"lastModified\":\"2024-11-21T02:49:19.253\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de XSS en la Web UI en Spacewalk y Red Hat Satellite 5.7 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de (1) PATH_INFO en systems/SystemEntitlements.do; (2) el par\u00e1metro label en admin/multiorg/EntitlementDetails.do; o el nombre de (3) una etiqueta snapshot o (4) un grupo de sistema en System Set Manager (SSM).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85EA16E0-9261-45C4-840F-5366E9EAC5E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:spacewalk-java:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6F3D1C-DDF1-49B6-8E4D-38B037F33030\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0590.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1320444\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1320452\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1320940\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/7920542f\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/982b11c9\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/b6491eba\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0590.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1320444\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1320452\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1320940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/7920542f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/982b11c9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/spacewalkproject/spacewalk/commit/b6491eba\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-rh9g-8vr9-r79f
Vulnerability from github
Published
2022-05-13 01:04
Modified
2022-05-13 01:04
Severity ?
Details
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).
{ "affected": [], "aliases": [ "CVE-2016-3079" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-04-14T14:59:00Z", "severity": "MODERATE" }, "details": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).", "id": "GHSA-rh9g-8vr9-r79f", "modified": "2022-05-13T01:04:03Z", "published": "2022-05-13T01:04:03Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" }, { "type": "WEB", "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" }, { "type": "WEB", "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "type": "WEB", "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "type": "WEB", "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
rhsa-2016:0590
Vulnerability from csaf_redhat
Published
2016-04-04 15:35
Modified
2024-11-22 09:57
Summary
Red Hat Security Advisory: spacewalk-java security update
Notes
Topic
An update for spacewalk-java is now available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.
Security Fix(es):
* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)
* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)
* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)
Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Hutař (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for spacewalk-java is now available for Red Hat Satellite 5.7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.\n\nSecurity Fix(es):\n\n* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)\n\nRed Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Huta\u0159 (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0590", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1181152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181152" }, { "category": "external", "summary": "1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "1313515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "category": "external", "summary": "1313517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313517" }, { "category": "external", "summary": "1320444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "category": "external", "summary": "1320452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "category": "external", "summary": "1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0590.json" } ], "title": "Red Hat Security Advisory: spacewalk-java security update", "tracking": { "current_release_date": "2024-11-22T09:57:18+00:00", "generator": { "date": "2024-11-22T09:57:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0590", "initial_release_date": "2016-04-04T15:35:36+00:00", "revision_history": [ { "date": "2016-04-04T15:35:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-04-04T15:35:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:57:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-postgresql@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@2.3.8-134.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-0284", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1181472" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0284" }, { "category": "external", "summary": "RHBZ#1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0284", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284" } ], "release_date": "2015-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)" }, { "cve": "CVE-2016-2103", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305681" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: multiple stored XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2103" }, { "category": "external", "summary": "RHBZ#1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2103", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103" } ], "release_date": "2016-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: multiple stored XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Adam Willard" ], "organization": "Raytheon Foreground Security" } ], "cve": "CVE-2016-2104", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305677" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: stored and reflected XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "category": "external", "summary": "RHBZ#1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2104", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: stored and reflected XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-3079", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1320940" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "spacewalk-java: Multiple XSS issues in WebUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "category": "external", "summary": "RHBZ#1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" } ], "release_date": "2016-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spacewalk-java: Multiple XSS issues in WebUI" } ] }
RHSA-2016:0590
Vulnerability from csaf_redhat
Published
2016-04-04 15:35
Modified
2024-11-22 09:57
Summary
Red Hat Security Advisory: spacewalk-java security update
Notes
Topic
An update for spacewalk-java is now available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.
Security Fix(es):
* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)
* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)
* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)
Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Hutař (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for spacewalk-java is now available for Red Hat Satellite 5.7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.\n\nSecurity Fix(es):\n\n* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)\n\nRed Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Huta\u0159 (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0590", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1181152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181152" }, { "category": "external", "summary": "1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "1313515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "category": "external", "summary": "1313517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313517" }, { "category": "external", "summary": "1320444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "category": "external", "summary": "1320452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "category": "external", "summary": "1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0590.json" } ], "title": "Red Hat Security Advisory: spacewalk-java security update", "tracking": { "current_release_date": "2024-11-22T09:57:18+00:00", "generator": { "date": "2024-11-22T09:57:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0590", "initial_release_date": "2016-04-04T15:35:36+00:00", "revision_history": [ { "date": "2016-04-04T15:35:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-04-04T15:35:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:57:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-postgresql@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@2.3.8-134.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-0284", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1181472" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0284" }, { "category": "external", "summary": "RHBZ#1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0284", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284" } ], "release_date": "2015-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)" }, { "cve": "CVE-2016-2103", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305681" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: multiple stored XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2103" }, { "category": "external", "summary": "RHBZ#1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2103", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103" } ], "release_date": "2016-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: multiple stored XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Adam Willard" ], "organization": "Raytheon Foreground Security" } ], "cve": "CVE-2016-2104", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305677" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: stored and reflected XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "category": "external", "summary": "RHBZ#1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2104", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: stored and reflected XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-3079", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1320940" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "spacewalk-java: Multiple XSS issues in WebUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "category": "external", "summary": "RHBZ#1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" } ], "release_date": "2016-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spacewalk-java: Multiple XSS issues in WebUI" } ] }
rhsa-2016_0590
Vulnerability from csaf_redhat
Published
2016-04-04 15:35
Modified
2024-11-22 09:57
Summary
Red Hat Security Advisory: spacewalk-java security update
Notes
Topic
An update for spacewalk-java is now available for Red Hat Satellite 5.7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.
Security Fix(es):
* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)
* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)
* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)
Red Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Hutař (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for spacewalk-java is now available for Red Hat Satellite 5.7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and the remote management of multiple Linux deployments with a single, centralized tool.\n\nSecurity Fix(es):\n\n* A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users. (CVE-2015-0284)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2103, CVE-2016-3079)\n\n* Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users. (CVE-2016-2104)\n\nRed Hat would like to thank Adam Willard (Raytheon Foreground Security) for reporting CVE-2016-2104. The CVE-2015-0284 and CVE-2016-3079 issues were discovered by Jan Huta\u0159 (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0590", "url": "https://access.redhat.com/errata/RHSA-2016:0590" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1181152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181152" }, { "category": "external", "summary": "1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "1313515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313515" }, { "category": "external", "summary": "1313517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313517" }, { "category": "external", "summary": "1320444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "category": "external", "summary": "1320452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "category": "external", "summary": "1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0590.json" } ], "title": "Red Hat Security Advisory: spacewalk-java security update", "tracking": { "current_release_date": "2024-11-22T09:57:18+00:00", "generator": { "date": "2024-11-22T09:57:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0590", "initial_release_date": "2016-04-04T15:35:36+00:00", "revision_history": [ { "date": "2016-04-04T15:35:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-04-04T15:35:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:57:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-oracle@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-taskomatic@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-postgresql@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-config@2.3.8-134.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_id": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/spacewalk-java-lib@2.3.8-134.el6sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-0:2.3.8-134.el6sat.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src" }, "product_reference": "spacewalk-java-0:2.3.8-134.el6sat.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" }, "product_reference": "spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-0284", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1181472" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in how XML data was handled in Red Hat Satellite. A user able to use the XMLRPC API could exploit this flaw to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0284" }, { "category": "external", "summary": "RHBZ#1181472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0284", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0284" } ], "release_date": "2015-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Satellite: stored XSS in user details fields (incomplete fix for CVE-2014-7811)" }, { "cve": "CVE-2016-2103", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305681" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: multiple stored XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2103" }, { "category": "external", "summary": "RHBZ#1305681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2103", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2103" } ], "release_date": "2016-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: multiple stored XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Adam Willard" ], "organization": "Raytheon Foreground Security" } ], "cve": "CVE-2016-2104", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1305677" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way HTTP GET parameter data was handled in Red Hat Satellite. A user able to provide malicious links to a Satellite user could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "5: stored and reflected XSS vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2104" }, { "category": "external", "summary": "RHBZ#1305677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2104", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2104" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "5: stored and reflected XSS vulnerabilities" }, { "acknowledgments": [ { "names": [ "Jan Huta\u0159" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-3079", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1320940" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) flaws were found in the way certain form data was handled in Red Hat Satellite. A user able to enter form data could use these flaws to perform XSS attacks against other Satellite users.", "title": "Vulnerability description" }, { "category": "summary", "text": "spacewalk-java: Multiple XSS issues in WebUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3079" }, { "category": "external", "summary": "RHBZ#1320940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3079" } ], "release_date": "2016-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-04-04T15:35:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0590" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-0:2.3.8-134.el6sat.src", "6Server-Satellite57:spacewalk-java-config-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-lib-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-oracle-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-java-postgresql-0:2.3.8-134.el6sat.noarch", "6Server-Satellite57:spacewalk-taskomatic-0:2.3.8-134.el6sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spacewalk-java: Multiple XSS issues in WebUI" } ] }
gsd-2016-3079
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-3079", "description": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).", "id": "GSD-2016-3079", "references": [ "https://www.suse.com/security/cve/CVE-2016-3079.html", "https://access.redhat.com/errata/RHSA-2016:0590" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-3079" ], "details": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).", "id": "GSD-2016-3079", "modified": "2023-12-13T01:21:27.429293Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3079", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2016-0590.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/7920542f", "refsource": "MISC", "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad", "refsource": "MISC", "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9", "refsource": "MISC", "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba", "refsource": "MISC", "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:spacewalk-java:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3079" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/7920542f", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" }, { "name": "RHSA-2016:0590", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "name": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2023-02-12T23:18Z", "publishedDate": "2016-04-14T14:59Z" } } }
cve-2016-3079
Vulnerability from fkie_nvd
Published
2016-04-14 14:59
Modified
2024-11-21 02:49
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | satellite | 5.7 | |
redhat | spacewalk-java | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "85EA16E0-9261-45C4-840F-5366E9EAC5E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:spacewalk-java:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6F3D1C-DDF1-49B6-8E4D-38B037F33030", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM)." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en la Web UI en Spacewalk y Red Hat Satellite 5.7 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de (1) PATH_INFO en systems/SystemEntitlements.do; (2) el par\u00e1metro label en admin/multiorg/EntitlementDetails.do; o el nombre de (3) una etiqueta snapshot o (4) un grupo de sistema en System Set Manager (SSM)." } ], "id": "CVE-2016-3079", "lastModified": "2024-11-21T02:49:19.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T14:59:08.177", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "source": "secalert@redhat.com", "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" }, { "source": "secalert@redhat.com", "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "source": "secalert@redhat.com", "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "source": "secalert@redhat.com", "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0590.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/spacewalkproject/spacewalk/commit/7920542f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/spacewalkproject/spacewalk/commit/7b9ff9ad" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/spacewalkproject/spacewalk/commit/982b11c9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/spacewalkproject/spacewalk/commit/b6491eba" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.