Lucene search

K
cve[email protected]CVE-2023-0119
HistorySep 12, 2023 - 4:15 p.m.

CVE-2023-0119

2023-09-1216:15:08
CWE-79
web.nvd.nist.gov
63
foreman
stored xss
cross-site scripting
session hijacking
user credentials
security vulnerability
cve-2023-0119
nvd

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.1%

A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user’s session, make requests on behalf of the user, and obtain user credentials.

Affected configurations

NVD
Node
redhatsatelliteMatch6.13
AND
redhatenterprise_linuxMatch8.0
CPENameOperatorVersion
redhat:satelliteredhat satelliteeq6.13

CNA Affected

[
  {
    "versions": [
      {
        "status": "unaffected",
        "version": "3.4.2"
      },
      {
        "status": "unaffected",
        "version": "3.5.1.16"
      },
      {
        "status": "unaffected",
        "version": "3.5.2"
      },
      {
        "status": "unaffected",
        "version": "3.6.0"
      }
    ],
    "packageName": "foreman",
    "collectionURL": "https://github.com/theforeman/foreman"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.13 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.5.1.17-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.13::el8",
      "cpe:/a:redhat:satellite_utils:6.13::el8",
      "cpe:/a:redhat:satellite_maintenance:6.13::el8",
      "cpe:/a:redhat:satellite:6.13::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.13 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.5.1.17-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_capsule:6.13::el8",
      "cpe:/a:redhat:satellite_utils:6.13::el8",
      "cpe:/a:redhat:satellite_maintenance:6.13::el8",
      "cpe:/a:redhat:satellite:6.13::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.14 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.7.0.9-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_maintenance:6.14::el8",
      "cpe:/a:redhat:satellite_utils:6.14::el8",
      "cpe:/a:redhat:satellite:6.14::el8",
      "cpe:/a:redhat:satellite_capsule:6.14::el8"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Satellite 6.14 for RHEL 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "foreman",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "0:3.7.0.9-1.el8sat",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/a:redhat:satellite_maintenance:6.14::el8",
      "cpe:/a:redhat:satellite_utils:6.14::el8",
      "cpe:/a:redhat:satellite:6.14::el8",
      "cpe:/a:redhat:satellite_capsule:6.14::el8"
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.1%