First published: Thu Nov 29 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in systems/sdc/notes.jsp in Spacewalk and Red Hat Network (RHN) Satellite 5.6 allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) content values of a note in a system.addNote XML-RPC call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/spacewalk-java-2.0.2 | <57 | 57 |
Red Hat Satellite | =5.6 | |
Red Hat Satellite | =5.6 | |
Red Hat Spacewalk | =2.0.2-57 |
https://git.fedorahosted.org/cgit/spacewalk.git/commit/?id=18c70164285cae0660fa3ac55c6656bb19b3b13f
https://git.fedorahosted.org/cgit/spacewalk.git/commit/?id=1d0f4b4a78ea03d9f2d05fbd52236b1f2ab68e85
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6149 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2012-6149, update to a patched version of Red Hat Satellite or Spacewalk that addresses the XSS vulnerabilities.
CVE-2012-6149 affects Red Hat Satellite 5.6 and Spacewalk Java 2.0.2 versions lower than 57.
CVE-2012-6149 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary web scripts.
Yes, CVE-2012-6149 can be exploited remotely by attackers through malicious input in system.addNote XML-RPC calls.