First published: Wed Aug 31 2011(Updated: )
Multiple cross-site scripting (XSS) flaws were found in the JON administration interface. If a remote attacker could trick a user, who was logged into the JON administration interface, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's JON session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Operations Network | <=2.4.1 | |
Red Hat JBoss Operations Network | =2.0.0 | |
Red Hat JBoss Operations Network | =2.0.1 | |
Red Hat JBoss Operations Network | =2.1.0 | |
Red Hat JBoss Operations Network | =2.2 | |
Red Hat JBoss Operations Network | =2.3 | |
Red Hat JBoss Operations Network | =2.3.1 | |
Red Hat JBoss Operations Network | =2.4 | |
RHQ Project | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3206 has a moderate severity rating due to its potential for exploitation via cross-site scripting.
To fix CVE-2011-3206, upgrade to a version of JBoss Operations Network or RHQ that addresses this vulnerability.
CVE-2011-3206 affects versions of RHQ 4.2.0 and multiple versions of Red Hat JBoss Operations Network.
The impact of CVE-2011-3206 allows attackers to execute arbitrary web scripts in the context of a logged-in user.
CVE-2011-3206 can be exploited by remote attackers who can trick users into visiting specially-crafted URLs.