cvelist/2019/19xxx/CVE-2019-19336.json

72 lines
2.2 KiB
JSON
Raw Normal View History

2019-11-27 17:00:59 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19336",
2020-03-19 14:01:21 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2020-03-18 12:52:36 -03:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "ovirt-engine",
"version": {
"version_data": [
{
"version_value": "4.3.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19336",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19336",
"refsource": "CONFIRM"
}
]
2019-11-27 17:00:59 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-03-18 12:52:36 -03:00
"value": "A cross-site scripting vulnerability was reported in the oVirt-engine's OAuth authorization endpoint before version 4.3.8. URL parameters were included in the HTML response without escaping. This flaw would allow an attacker to craft malicious HTML pages that can run scripts in the context of the user's oVirt session."
2019-11-27 17:00:59 +00:00
}
]
2020-03-18 12:52:36 -03:00
},
"impact": {
"cvss": [
[
{
"vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
}
]
]
2019-11-27 17:00:59 +00:00
}
2020-03-19 14:01:21 +00:00
}