CVE-2017-18635 – novnc: XSS vulnerability via the messages propagated to the status field
https://notcve.org/view.php?id=CVE-2017-18635
An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name. Se detectó una vulnerabilidad de tipo XSS en noVNC versiones anteriores a 0.6.2, en la que el servidor remoto VNC podía inyectar HTML arbitrario en la página web de noVNC por medio de los mensajes propagados hacia el campo status, tales como el nombre del servidor VNC. An XSS vulnerability was discovered in noVNC in which arbitrary HTML could be injected into the noVNC web page. An attacker having access to a VNC server could use target host values in a crafted URL to gain access to secure information (such as VM tokens). • https://github.com/ShielderSec/CVE-2017-18635 https://github.com/ossf-cve-benchmark/CVE-2017-18635 https://access.redhat.com/errata/RHSA-2020:0754 https://bugs.launchpad.net/horizon/+bug/1656435 https://github.com/ShielderSec/cve-2017-18635 https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534 https://github.com/novnc/noVNC/issues/748 https://github.com/novnc/noVNC/releases/tag/v0.6.2 https://lists.debian.org/debian-lts-announce • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2013-7436 – novnc: session hijack through insecurely set session token cookies
https://notcve.org/view.php?id=CVE-2013-7436
noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. noVNC anterior a 0.5 no configura la bandera de seguro para una cookie en una sesión https, lo que facilita a atacantes remotos capturar esta cookie mediante la intercepción de su transmisión dentro de una sesión http. It was discovered that noVNC did not properly set the 'secure' flag when issuing cookies. An attacker could use this flaw to intercept cookies via a man-in-the-middle attack. • http://rhn.redhat.com/errata/RHSA-2015-0788.html http://rhn.redhat.com/errata/RHSA-2015-0833.html http://rhn.redhat.com/errata/RHSA-2015-0834.html http://rhn.redhat.com/errata/RHSA-2015-0884.html http://www.openwall.com/lists/oss-security/2015/02/17/1 http://www.openwall.com/lists/oss-security/2015/03/12/13 https://bugzilla.redhat.com/show_bug.cgi?id=1193451 https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd https://access.redhat.com/secur • CWE-310: Cryptographic Issues CWE-319: Cleartext Transmission of Sensitive Information •