rhsa-2013_0187
Vulnerability from csaf_redhat
Published
2013-01-23 21:40
Modified
2024-11-22 06:01
Summary
Red Hat Security Advisory: JBoss Operations Network 3.1.2 update
Notes
Topic
JBoss Operations Network 3.1.2, which fixes one security issue and several
bugs, is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
JBoss Operations Network (JBoss ON) is a middleware management solution
that provides a single point of control to deploy, manage, and monitor
JBoss Enterprise Middleware, applications, and services.
This JBoss ON 3.1.2 release serves as a replacement for JBoss ON 3.1.1, and
includes several bug fixes. Refer to the JBoss ON 3.1.2 Release Notes for
information on the most significant of these changes. The Release Notes
will be available shortly from https://access.redhat.com/knowledge/docs/
The following security issue is also fixed with this release:
A cross-site scripting (XSS) flaw was found in Google Web Toolkit (GWT), a
core part of the JBoss ON web interface. If a remote attacker could trick a
user, who was logged into the JBoss ON web interface, into visiting a
specially-crafted URL, it could possibly lead to arbitrary web script
execution in the context of the user's JBoss ON session. (CVE-2012-5920)
Warning: Before applying the update, back up your existing JBoss ON
installation (including its databases, applications, configuration files,
the JBoss ON server's file system directory, and so on).
All users of JBoss Operations Network 3.1.1 as provided from the Red Hat
Customer Portal are advised to upgrade to JBoss Operations Network 3.1.2.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "JBoss Operations Network 3.1.2, which fixes one security issue and several\nbugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", title: "Topic", }, { category: "general", text: "JBoss Operations Network (JBoss ON) is a middleware management solution\nthat provides a single point of control to deploy, manage, and monitor\nJBoss Enterprise Middleware, applications, and services.\n\nThis JBoss ON 3.1.2 release serves as a replacement for JBoss ON 3.1.1, and\nincludes several bug fixes. Refer to the JBoss ON 3.1.2 Release Notes for\ninformation on the most significant of these changes. The Release Notes\nwill be available shortly from https://access.redhat.com/knowledge/docs/\n\nThe following security issue is also fixed with this release:\n\nA cross-site scripting (XSS) flaw was found in Google Web Toolkit (GWT), a\ncore part of the JBoss ON web interface. If a remote attacker could trick a\nuser, who was logged into the JBoss ON web interface, into visiting a\nspecially-crafted URL, it could possibly lead to arbitrary web script\nexecution in the context of the user's JBoss ON session. (CVE-2012-5920)\n\nWarning: Before applying the update, back up your existing JBoss ON\ninstallation (including its databases, applications, configuration files,\nthe JBoss ON server's file system directory, and so on).\n\nAll users of JBoss Operations Network 3.1.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Operations Network 3.1.2.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2013:0187", url: "https://access.redhat.com/errata/RHSA-2013:0187", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=em&version=3.1.2", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=em&version=3.1.2", }, { category: "external", summary: "https://developers.google.com/web-toolkit/release-notes#Release_Notes_Current", url: "https://developers.google.com/web-toolkit/release-notes#Release_Notes_Current", }, { category: "external", summary: "https://access.redhat.com/knowledge/docs/", url: "https://access.redhat.com/knowledge/docs/", }, { category: "external", summary: "871690", url: "https://bugzilla.redhat.com/show_bug.cgi?id=871690", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0187.json", }, ], title: "Red Hat Security Advisory: JBoss Operations Network 3.1.2 update", tracking: { current_release_date: "2024-11-22T06:01:02+00:00", generator: { date: "2024-11-22T06:01:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2013:0187", initial_release_date: "2013-01-23T21:40:00+00:00", revision_history: [ { date: "2013-01-23T21:40:00+00:00", number: "1", summary: "Initial version", }, { date: "2013-01-23T21:46:46+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T06:01:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Operations Network 3.1", product: { name: "Red Hat JBoss Operations Network 3.1", product_id: "Red Hat JBoss Operations Network 3.1", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_operations_network:3.1.2", }, }, }, ], category: "product_family", name: "Red Hat JBoss Operations Network", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2012-5920", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2012-10-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "871690", }, ], notes: [ { category: "description", text: "Cross-site scripting (XSS) vulnerability in Google Web Toolkit (GWT) 2.4 through 2.5 Final, as used in JBoss Operations Network (ON) 3.1.1 and possibly other products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this issue exists because of an incomplete fix for CVE-2012-4563.", title: "Vulnerability description", }, { category: "summary", text: "GWT: unknown XSS flaw", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Operations Network 3.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-5920", }, { category: "external", summary: "RHBZ#871690", url: "https://bugzilla.redhat.com/show_bug.cgi?id=871690", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-5920", url: "https://www.cve.org/CVERecord?id=CVE-2012-5920", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-5920", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-5920", }, { category: "external", summary: "https://developers.google.com/web-toolkit/release-notes#Release_Notes_Current", url: "https://developers.google.com/web-toolkit/release-notes#Release_Notes_Current", }, ], release_date: "2012-10-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2013-01-23T21:40:00+00:00", details: "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss ON installation (including its databases, applications,\nconfiguration files, the JBoss ON server's file system directory, and so\non).\n\nRefer to the JBoss Operations Network 3.1.2 Release Notes for installation\ninformation.", product_ids: [ "Red Hat JBoss Operations Network 3.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2013:0187", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Operations Network 3.1", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "GWT: unknown XSS flaw", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.