The remote Redhat Enterprise Linux 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2022:8057 advisory.
– sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
– golang: net/https: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
– golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
– grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
– prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
– grafana: XSS vulnerability in data source handling (CVE-2022-21702)
– grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
– grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
– golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
– golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
– golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
– golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
– golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
– golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
– golang: net/http/httputil: NewSingleHostReverseProxy – omit X-Forwarded-For not working (CVE-2022-32148)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.Read More