Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-3971— Controller: html injection in custom login info

CVSS 7.3 · High EPSS 0.40% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-3971

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Controller: html injection in custom login info
Source: NVD (National Vulnerability Database)
Vulnerability Description
An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Ansible automation controller 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Ansible automation controller是美国红帽(Red Hat)公司的一种集中的管理工具。用于管理库存、启动和安排工作流、跟踪更改以及将报告与集中的用户界面集成。 Red Hat Ansible automation controller 存在安全漏洞,该漏洞源于在用户界面设置的控制器中存在HTML注入,允许攻击者通过注入HTML创建自定义登录页面来捕获凭据,从而导致完全妥协。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Ansible Automation Platform 2.3 for RHEL 8 0:4.3.11-1.el8ap ~ * cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9
Red HatRed Hat Ansible Automation Platform 2.3 for RHEL 9 0:4.3.11-1.el9ap ~ * cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9
Red HatRed Hat Ansible Automation Platform 2.4 for RHEL 8 0:4.4.1-1.el8ap ~ * cpe:/a:redhat:ansible_automation_platform:2.4::el8
Red HatRed Hat Ansible Automation Platform 2.4 for RHEL 9 0:4.4.1-1.el9ap ~ * cpe:/a:redhat:ansible_automation_platform:2.4::el8

II. Public POCs for CVE-2023-3971

#POC DescriptionSource LinkShenlong Link
1To find HTML injection and XSS https://github.com/ashangp923/CVE-2023-3971POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-3971

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2023-10-04 · 8 CVEs total

CVE-2023-391918.2 HIGHKernel: ebpf: insufficient stack type checks in dynptr
CVE-2023-45867.4 HIGHHotrod-client: hot rod client does not enable hostname validation when using tls that lea
CVE-2023-42377.3 HIGHPlatform: ec2_key module prints out the private key directly to the standard output
CVE-2023-43806.3 MEDIUMPlatform: token exposed at importing project
CVE-2023-34286.2 MEDIUMImagemagick: heap-buffer-overflow in coders/tiff.c
CVE-2023-35765.5 MEDIUMLibtiff: memory leak in tiffcrop.c
CVE-2023-24225.5 MEDIUMKeycloak: oauth client impersonation

IV. Related Vulnerabilities

V. Comments for CVE-2023-3971

No comments yet


Leave a comment