rpm package
suse/salt-netapi-client&distro=SUSE Manager Server 3.0
pkg:rpm/suse/salt-netapi-client&distro=SUSE%20Manager%20Server%203.0
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-7514 | — | < 0.13.0-16.6.4 | 0.13.0-16.6.4 | Jul 30, 2018 | A cross-site scripting (XSS) flaw was found in how the failed action entry is processed in Red Hat Satellite before version 5.8.0. A user able to specify a failed action could exploit this flaw to perform XSS attacks against other Satellite users. | ||
| CVE-2017-7470 | — | < 0.11.1-12.1 | 0.11.1-12.1 | Jul 27, 2018 | It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py. | ||
| CVE-2017-7538 | — | < 0.12.0-16.3.1 | 0.12.0-16.3.1 | Jul 26, 2018 | A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users. |
- CVE-2017-7514Jul 30, 2018affected < 0.13.0-16.6.4fixed 0.13.0-16.6.4
A cross-site scripting (XSS) flaw was found in how the failed action entry is processed in Red Hat Satellite before version 5.8.0. A user able to specify a failed action could exploit this flaw to perform XSS attacks against other Satellite users.
- CVE-2017-7470Jul 27, 2018affected < 0.11.1-12.1fixed 0.11.1-12.1
It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.
- CVE-2017-7538Jul 26, 2018affected < 0.12.0-16.3.1fixed 0.12.0-16.3.1
A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users.