First published: Tue Oct 09 2012(Updated: )
Multiple cross-site scripting (XSS) flaws were found in the way: 1) 'displayCRL' script of Certificate System sanitized content of 'pageStart' and 'pageSize' variables provided in the query string, 2) 'profileProcess' script of Certificate System sanitized content of 'nonce' variable provided in the query string. A remote attacker could provide a specially-crafted web page that, when visited by an unsuspecting Certificate System user would lead to arbitrary HTML or web script execution in the context of Certificate System user session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-common | <8.1.3-2.el5 | 8.1.3-2.el5 |
Red Hat Certificate System | <=8.1.1 | |
Red Hat Certificate System | =7.1 | |
Red Hat Certificate System | =7.2 | |
Red Hat Certificate System | =7.3 | |
Red Hat Certificate System | =8 | |
Red Hat Certificate System | =8.0 | |
Red Hat Certificate System | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4543 is classified as a moderate severity vulnerability due to its cross-site scripting (XSS) flaws.
To fix CVE-2012-4543, update the pki-common package to version 8.1.3-2.el5 or later.
CVE-2012-4543 affects Red Hat Certificate System versions up to and including 8.1.1 and specific versions 7.1 to 8.1.
CVE-2012-4543 exploits the 'displayCRL' and 'profileProcess' scripts within the Certificate System.
Exploitation of CVE-2012-4543 could allow an attacker to execute arbitrary scripts in the context of a user's session.