cvelist/2018/16xxx/CVE-2018-16861.json

83 lines
2.8 KiB
JSON
Raw Normal View History

2018-09-11 13:06:17 -04:00
{
2019-03-18 02:29:40 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-16861",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "foreman",
"version": {
"version_data": [
{
"version_value": "1.18.3"
},
{
"version_value": "1.19.1"
},
{
"version_value": "1.20.0"
}
]
}
}
]
},
"vendor_name": "The Foreman Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-12-06 11:38:17 -03:00
{
2019-03-18 02:29:40 +00:00
"lang": "eng",
"value": "A cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to execute a XSS attacks against other users, possibly leading to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Foreman before 1.18.3, 1.19.1, and 1.20.0 are vulnerable."
2018-12-06 11:38:17 -03:00
}
2019-03-18 02:29:40 +00:00
]
},
"impact": {
"cvss": [
[
{
"vectorString": "7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
2018-12-06 11:38:17 -03:00
{
2019-03-18 02:29:40 +00:00
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
2018-12-06 11:38:17 -03:00
}
2019-03-18 02:29:40 +00:00
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16861",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16861"
2019-05-14 17:00:57 +00:00
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1222",
"url": "https://access.redhat.com/errata/RHSA-2019:1222"
2019-03-18 02:29:40 +00:00
}
]
}
}