CVE-2011-3206
JON: Multiple XSS flaws
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in RHQ 4.2.0, as used in JBoss Operations Network (aka JON or JBoss ON) before 3.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Varias vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en la interfaz de administración de RHQ v4.2.0, tal y como se utiliza en JBoss Operations Network (también conocido como Jon o JBoss ON) antes de la versión v3.0, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2011-08-19 CVE Reserved
- 2012-01-08 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1026435 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-0089.html | 2014-02-21 | |
http://secunia.com/advisories/47197 | 2014-02-21 | |
http://secunia.com/advisories/47280 | 2014-02-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=734662 | 2012-02-01 | |
https://access.redhat.com/security/cve/CVE-2011-3206 | 2012-02-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | <= 2.4.1 Search vendor "Redhat" for product "Jboss Operations Network" and version " <= 2.4.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.0.0 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.0.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.0.1 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.0.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.1.0 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.1.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.2 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.3 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.3" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.3.1 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.3.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Operations Network Search vendor "Redhat" for product "Jboss Operations Network" | 2.4 Search vendor "Redhat" for product "Jboss Operations Network" and version "2.4" | - |
Affected
| ||||||
Rhq-project Search vendor "Rhq-project" | Rhq Search vendor "Rhq-project" for product "Rhq" | 4.2.0 Search vendor "Rhq-project" for product "Rhq" and version "4.2.0" | - |
Affected
|