cvelist/2019/10xxx/CVE-2019-10146.json

155 lines
6.0 KiB
JSON
Raw Normal View History

2019-03-27 12:00:51 +00:00
{
2023-02-02 21:01:38 +00:00
"data_version": "4.0",
2019-03-27 12:00:51 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2019-10146",
2020-03-18 15:01:25 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2020-02-05 11:32:27 +05:30
},
2023-02-02 21:01:38 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Reflected Cross Site Scripting flaw was found in the pki-ca module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
2020-02-05 11:32:27 +05:30
"affects": {
"vendor": {
"vendor_data": [
{
2020-03-18 15:12:18 +01:00
"vendor_name": "Red Hat",
2020-02-05 11:32:27 +05:30
"product": {
"product_data": [
{
2023-02-02 21:01:38 +00:00
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:10.5.18-12.el7_9",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:10.5.9-15.el7_6",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7.7 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "0:10.5.16-7.el7_7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
2020-02-05 11:32:27 +05:30
"version": {
"version_data": [
{
2023-02-02 21:01:38 +00:00
"version_value": "8030020200911215836.5ff1562f",
"version_affected": "!"
},
{
"version_value": "8030020200527165326.30b713e6",
"version_affected": "!"
2020-02-05 11:32:27 +05:30
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2023-02-02 21:01:38 +00:00
"url": "https://access.redhat.com/errata/RHSA-2020:4847",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2020:4847"
},
2019-03-27 12:00:51 +00:00
{
2023-02-02 21:01:38 +00:00
"url": "https://access.redhat.com/errata/RHSA-2021:0819",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0819"
},
{
"url": "https://access.redhat.com/errata/RHSA-2021:0851",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0851"
},
{
"url": "https://access.redhat.com/errata/RHSA-2021:0975",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2021:0975"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2019-10146",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-10146"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710171",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1710171"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146"
2019-03-27 12:00:51 +00:00
}
]
2020-02-05 11:32:27 +05:30
},
2023-02-02 21:01:38 +00:00
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Pritam Singh (Red Hat)."
}
],
2020-02-05 11:32:27 +05:30
"impact": {
"cvss": [
2023-02-02 21:01:38 +00:00
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
2020-02-05 11:32:27 +05:30
]
2019-03-27 12:00:51 +00:00
}
2020-03-18 15:01:25 +00:00
}