CVE-2023-3971
Controller: html injection in custom login info
Severity Score
5.4
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
Se encontró una falla de inyección de HTML en Controller en la configuración de la interfaz de usuario. Esta falla permite a un atacante capturar credenciales creando una página de inicio de sesión personalizada mediante la inyección de HTML, lo que resulta en un compromiso total.
*Credits:
Red Hat would like to thank Kunal Pusdekar (redhat) for reporting this issue.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-07-27 CVE Reserved
- 2023-08-01 CVE Published
- 2024-05-06 First Exploit
- 2024-09-03 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CAPEC
References (5)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/ashangp923/CVE-2023-3971 | 2024-05-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:4340 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2023:4590 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2023-3971 | 2023-08-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2226965 | 2023-08-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Ansible Automation Platform Search vendor "Redhat" for product "Ansible Automation Platform" | 2.3 Search vendor "Redhat" for product "Ansible Automation Platform" and version "2.3" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Automation Platform Search vendor "Redhat" for product "Ansible Automation Platform" | 2.3 Search vendor "Redhat" for product "Ansible Automation Platform" and version "2.3" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Automation Platform Search vendor "Redhat" for product "Ansible Automation Platform" | 2.4 Search vendor "Redhat" for product "Ansible Automation Platform" and version "2.4" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Automation Platform Search vendor "Redhat" for product "Ansible Automation Platform" | 2.4 Search vendor "Redhat" for product "Ansible Automation Platform" and version "2.4" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Developer Search vendor "Redhat" for product "Ansible Developer" | 1.0 Search vendor "Redhat" for product "Ansible Developer" and version "1.0" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Developer Search vendor "Redhat" for product "Ansible Developer" | 1.0 Search vendor "Redhat" for product "Ansible Developer" and version "1.0" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Inside Search vendor "Redhat" for product "Ansible Inside" | 1.1 Search vendor "Redhat" for product "Ansible Inside" and version "1.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Inside Search vendor "Redhat" for product "Ansible Inside" | 1.1 Search vendor "Redhat" for product "Ansible Inside" and version "1.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Safe
|
Redhat Search vendor "Redhat" | Ansible Automation Controller Search vendor "Redhat" for product "Ansible Automation Controller" | < 4.3.11 Search vendor "Redhat" for product "Ansible Automation Controller" and version " < 4.3.11" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Ansible Automation Controller Search vendor "Redhat" for product "Ansible Automation Controller" | 4.4 Search vendor "Redhat" for product "Ansible Automation Controller" and version "4.4" | - |
Affected
|