First published: Wed Nov 06 2019(Updated: )
Pagure: XSS possible in file attachment endpoint
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Pagure | <2.3.4 | |
Fedoraproject Fedora | =24 | |
Redhat Enterprise Linux | =7.0 | |
debian/pagure | 5.11.3+dfsg-1 5.11.3+dfsg-2.1 5.11.3+dfsg-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Pagure: XSS possible in file attachment endpoint is CVE-2016-1000037.
The severity of CVE-2016-1000037 is medium with a severity value of 6.1.
CVE-2016-1000037 affects Pagure through its file attachment endpoint, where a cross-site scripting vulnerability is possible.
To fix the XSS vulnerability in Pagure's file attachment endpoint, it is recommended to update to version 5.11.3+dfsg-1 or 5.11.3+dfsg-2.1 for the debian source, or apply the necessary patches provided by the respective vendors for Redhat Pagure, Fedoraproject Fedora, and Redhat Enterprise Linux.
More information about CVE-2016-1000037 can be found in the following references: [1] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037, [2] https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/, [3] https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json