Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3536

Опубликовано: 12 апр. 2021
Источник: redhat
CVSS3: 3.5

Описание

A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.

A flaw was found in Wildfly. While creating a new role in the domain mode via the admin console, it is possible to add a payload in the name field, leading to a Cross-site scripting attack (XSS). The highest threat from this vulnerability is to confidentiality and integrity.

Отчет

This flaw does not affect Red Hat CodeReady Studio 12 because it uses the Wildfly client only. The domain mode is not used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat AMQ Broker 7wildflyNot affected
Red Hat build of QuarkuswildflyFix deferred
Red Hat CodeReady Studio 12wildflyNot affected
Red Hat Data Grid 8wildflyFix deferred
Red Hat Decision Manager 7wildflyNot affected
Red Hat Integration Camel K 1wildflyNot affected
Red Hat Integration Camel Quarkus 1wildflyNot affected
Red Hat Integration Service RegistrywildflyNot affected
Red Hat JBoss Data Grid 7wildflyOut of support scope
Red Hat OpenShift Application RuntimeswildflyAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1948001wildfly: XSS via admin console when creating roles in domain mode

3.5 Low

CVSS3

Связанные уязвимости

CVSS3: 4.8
nvd
больше 4 лет назад

A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.

CVSS3: 4.8
debian
больше 4 лет назад

A flaw was found in Wildfly in versions before 23.0.2.Final while crea ...

CVSS3: 3.8
github
больше 4 лет назад

Cross-site Scripting in Wildfly

3.5 Low

CVSS3