First published: Thu Jul 27 2023(Updated: )
An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Automation Controller | <4.3.11 | |
Redhat Ansible Automation Controller | =4.4 | |
Redhat Ansible Automation Platform | =2.3 | |
Redhat Ansible Automation Platform | =2.4 | |
Redhat Ansible Developer | =1.0 | |
Redhat Ansible Inside | =1.1 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
redhat/automation-controller | <0:4.3.11-1.el8a | 0:4.3.11-1.el8a |
redhat/automation-controller | <0:4.3.11-1.el9a | 0:4.3.11-1.el9a |
redhat/automation-controller | <0:4.4.1-1.el8a | 0:4.4.1-1.el8a |
redhat/automation-controller | <0:4.4.1-1.el9a | 0:4.4.1-1.el9a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this HTML injection flaw is CVE-2023-3971.
The severity of CVE-2023-3971 is high.
The HTML injection flaw allows an attacker to inject HTML in the user interface settings, creating a custom login page to capture credentials and potentially leading to a complete compromise.
Automation Controller versions up to and excluding 4.3.11 and 4.4.1 are affected by CVE-2023-3971.
To fix the HTML injection flaw, update Automation Controller to version 4.3.11 or higher and 4.4.1 or higher, depending on the affected version.