Fedora EPEL 7 update for viewvc



Published: 2023-08-16
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-22456
CVE-2023-22464
CWE-ID CWE-79
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Fedora
Operating systems & Components / Operating system

viewvc
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Stored cross-site scripting

EUVDB-ID: #VU70667

Risk: Low

CVSSv3.1: 4.2 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-22456

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within the revision view changed paths. A remote user with commit privileges to a Subversion repository can permanetly inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Mitigation

Upgrade viewvc to version 1.1.30-1.el7.

Vulnerable software versions

Fedora: 7

viewvc: before 1.1.30-1.el7

External links

http://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-96ef72f1b2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Stored cross-site scripting

EUVDB-ID: #VU70698

Risk: Low

CVSSv3.1: 4.2 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-22464

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in revision view changed path "copyfrom" locations. A remote user with commit privileges to a Subversion repository exposed by an otherwise trusted ViewVC instance can permanently inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Mitigation

Upgrade viewvc to version 1.1.30-1.el7.

Vulnerable software versions

Fedora: 7

viewvc: before 1.1.30-1.el7

External links

http://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-96ef72f1b2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###