4.8 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
12 packages
- cmctl
- scmccid
- pcmciaUtils
- pcmciautils
- rocmPackages.clang
- haskellPackages.mcmc
- rocmPackages_6.clang
- rocmPackages.llvm.clang
- rocmPackages.llvm.rocmcxx
- rocmPackages_6.llvm.clang
- haskellPackages.mcmc-types
- rocmPackages_6.llvm.rocmcxx
- @LeSuisse dismissed
HTML injection in Sensor Map in CMC before 25.6.0
A Stored HTML Injection vulnerability was discovered in the CMC's Sensor Map functionality due to improper validation on connected Guardians' properties. A malicious authenticated user with administrator privileges on a Guardian connected to a CMC can edit the Guardian's properties to inject HTML tags. If the Sensor Map functionality is enabled in the CMC, when a victim CMC user interacts with it, then the injected HTML may render in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
Affected products
- <25.6.0
Ignored packages (12)
pkgs.cmctl
Command line utility to interact with a cert-manager instalation on Kubernetes
pkgs.scmccid
PCSC drivers for linux, for the SCM SCR3310 v2.0 card and others
pkgs.pcmciaUtils
None
pkgs.pcmciautils
None
pkgs.rocmPackages.clang
None
pkgs.haskellPackages.mcmc
Sample from a posterior using Markov chain Monte Carlo
pkgs.rocmPackages_6.clang
None
pkgs.rocmPackages.llvm.clang
None
pkgs.rocmPackages.llvm.rocmcxx
None
pkgs.rocmPackages_6.llvm.clang
None
pkgs.haskellPackages.mcmc-types
Common types for sampling
pkgs.rocmPackages_6.llvm.rocmcxx
None