The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:0553 advisory.
– jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
– bootstrap: XSS in the data-target attribute (CVE-2016-10735)
– nodejs-moment: Regular expression denial of service (CVE-2017-18214)
– bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
– bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy (CVE-2018-14041)
– bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
– jquery: Prototype pollution in object’s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
– bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
– jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
– jquery: Untrusted code execution via tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
– wildfly-elytron: possible timing attacks via use of unsafe comparator (CVE-2022-3143)
– jettison: parser crash by stackoverflow (CVE-2022-40149)
– jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)
– woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152)
– jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)
– jackson-databind: use of deeply nested arrays (CVE-2022-42004)
– mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)
– jettison: If the value in map is the map’s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)
– Apache CXF: SSRF Vulnerability (CVE-2022-46364)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.Read More
References
https://bugzilla.redhat.com/2135247https://bugzilla.redhat.com/1399546http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14042https://access.redhat.com/security/cve/CVE-2018-14042http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3143http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004https://access.redhat.com/security/cve/CVE-2019-11358https://bugzilla.redhat.com/2135771https://bugzilla.redhat.com/2155682http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14040http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331https://access.redhat.com/security/cve/CVE-2015-9251http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46364https://bugzilla.redhat.com/1601617https://bugzilla.redhat.com/1601616https://access.redhat.com/security/cve/CVE-2022-42003https://access.redhat.com/security/cve/CVE-2022-45047https://bugzilla.redhat.com/2145194https://access.redhat.com/security/cve/CVE-2016-10735https://access.redhat.com/security/cve/CVE-2017-18214https://bugzilla.redhat.com/1850004https://access.redhat.com/security/cve/CVE-2022-40149https://access.redhat.com/security/cve/CVE-2018-14040https://bugzilla.redhat.com/2124682http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40152https://bugzilla.redhat.com/2135770https://bugzilla.redhat.com/1668097https://access.redhat.com/security/cve/CVE-2019-8331https://access.redhat.com/security/cve/CVE-2022-45693https://access.redhat.com/security/cve/CVE-2020-11022https://bugzilla.redhat.com/1686454http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45047https://bugzilla.redhat.com/1601614http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14041https://access.redhat.com/security/cve/CVE-2018-14041https://bugzilla.redhat.com/1701972http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40149https://bugzilla.redhat.com/1553413http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40150https://access.redhat.com/security/cve/CVE-2022-46364https://bugzilla.redhat.com/2134291https://bugzilla.redhat.com/1828406https://access.redhat.com/security/cve/CVE-2022-40150https://access.redhat.com/errata/RHSA-2023:0553https://access.redhat.com/security/cve/CVE-2022-40152https://bugzilla.redhat.com/2135244https://access.redhat.com/security/cve/CVE-2020-11023https://bugzilla.redhat.com/2155970http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18214http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45693http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735https://access.redhat.com/security/cve/CVE-2022-3143http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358https://access.redhat.com/security/cve/CVE-2022-42004CVSS2
- Access Vector
- Access Complexity
- Authentication
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Low
- None
- None
- None
- Partial
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
- Attack Vector
- Attack Complexity
- Privileges Required
- User Interaction
- Scope
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Low
- None
- None
- Unchanged
- High
- High
- High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Back to Main