An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
References
Link | Resource |
---|---|
https://github.com/novnc/noVNC/releases/tag/v0.6.2 | Release Notes Third Party Advisory |
https://github.com/novnc/noVNC/issues/748 | Patch Third Party Advisory |
https://bugs.launchpad.net/horizon/+bug/1656435 | Issue Tracking Third Party Advisory |
https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html | Mailing List Third Party Advisory |
https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ | Exploit Third Party Advisory |
https://github.com/ShielderSec/cve-2017-18635 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0754 | Third Party Advisory |
https://usn.ubuntu.com/4522-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-09-25 16:15
Updated : 2022-04-06 10:54
NVD link : CVE-2017-18635
Mitre link : CVE-2017-18635
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
novnc
- novnc
redhat
- openstack