First published: Mon Sep 21 2020(Updated: )
It was discovered that noVNC did not properly manage certain messages, resulting in the remote VNC server injecting arbitrary HTML into the noVNC web page. An attacker could use this issue to conduct cross-site scripting (XSS) attacks. (CVE-2017-18635)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/novnc | <1:0.4+dfsg+1+20131010+gitf68af8af3d-4+deb8u1build0.16.04.1 | 1:0.4+dfsg+1+20131010+gitf68af8af3d-4+deb8u1build0.16.04.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python-novnc | <1:0.4+dfsg+1+20131010+gitf68af8af3d-4+deb8u1build0.16.04.1 | 1:0.4+dfsg+1+20131010+gitf68af8af3d-4+deb8u1build0.16.04.1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability USN-4522-1 is considered to be a high severity issue due to its potential for cross-site scripting (XSS) attacks.
To fix USN-4522-1, update the noVNC and python-novnc packages to version 1:0.4+dfsg+1+20131010+gitf68af8af3d-4+deb8u1build0.16.04.1 or later.
USN-4522-1 allows attackers to perform cross-site scripting (XSS) attacks by injecting arbitrary HTML into the noVNC web page.
Ubuntu 16.04 is affected by the USN-4522-1 vulnerability in the noVNC and python-novnc packages.
The USN-4522-1 vulnerability impacts both the noVNC and python-novnc packages on Ubuntu.