First published: Sat Jan 12 2019(Updated: )
An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/novnc | <0:1.1.0-2.el7 | 0:1.1.0-2.el7 |
redhat/novnc | <0:1.1.0-1.el8 | 0:1.1.0-1.el8 |
Novnc Novnc | <0.6.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Redhat Openstack | =13 | |
redhat/novnc | <0.6.2 | 0.6.2 |
ubuntu/novnc | <1:0.4+dfsg+1+20131010+ | 1:0.4+dfsg+1+20131010+ |
debian/novnc | 1:1.0.0-3 1:1.3.0-1 1:1.3.0-2 | |
<0.6.2 | ||
=8.0 | ||
=9.0 | ||
=16.04 | ||
=13 |
There is no known mitigation for this issue, the flaw can only be resolved by applying updates.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-18635 is medium with a CVSS score of 6.1.
An attacker can exploit CVE-2017-18635 by injecting arbitrary HTML into the noVNC web page.
Versions before 0.6.2 of noVNC are affected by CVE-2017-18635.
To fix the vulnerability in noVNC, update to version 0.6.2 or above.
Yes, you can find references for CVE-2017-18635 at the following links: [Link 1](https://github.com/novnc/noVNC/issues/748), [Link 2](https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1765662).