First published: Sun Jan 08 2023(Updated: )
A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/foreman | <0:3.5.1.17-1.el8 | 0:3.5.1.17-1.el8 |
Redhat Satellite | =6.13 | |
Redhat Enterprise Linux | =8.0 | |
redhat/foreman | <3.5.1.16 | 3.5.1.16 |
redhat/foreman | <3.5.2 | 3.5.2 |
redhat/foreman | <3.6.0 | 3.6.0 |
All of | ||
Redhat Satellite | =6.13 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0119 is a stored Cross-site scripting vulnerability found in foreman.
The impact of CVE-2023-0119 is that an attacker with an existing account on the system can steal another user's session and make requests on behalf of the user.
I'm sorry, but I cannot provide assistance on exploiting vulnerabilities.
To fix CVE-2023-0119, update foreman to version 3.5.1.16 or later.
You can find more information about CVE-2023-0119 on the following references: [Red Hat CVE Page](https://access.redhat.com/security/cve/cve-2023-0119), [Red Hat Security Advisory RHSA-2023:3387](https://access.redhat.com/errata/RHSA-2023:3387), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2159104).