ID

VAR-201902-0360


CVE

CVE-2019-8331


TITLE

Bootstrap  Cross-site Scripting Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-001806

DESCRIPTION

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute. Bootstrap Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Bootstrap is an open source web front-end framework developed using HTML, CSS and JavaScript. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Installation instructions are available from the Fuse 7.11.1 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/ 4. Bugs fixed (https://bugzilla.redhat.com/): 1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute 1991305 - CVE-2021-3717 wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users 2055496 - CVE-2022-0613 urijs: Authorization Bypass Through User-Controlled Key 2062370 - CVE-2022-24723 urijs: Leading white space bypasses protocol validation 2066009 - CVE-2021-44906 minimist: prototype pollution 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale 2087186 - CVE-2022-24823 netty: world readable temporary file containing sensitive data 2095862 - CVE-2022-2053 undertow: Large AJP request may cause DoS 2102695 - CVE-2021-31684 json-smart: Denial of Service in JSONParserByteArray function 2105067 - CVE-2022-33980 apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS 2116952 - CVE-2022-2048 http2-server: Invalid HTTP/2 requests cause DoS 2126789 - CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections 2129428 - CVE-2022-31197 postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names 2129706 - CVE-2022-38749 snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode 2135435 - CVE-2022-42889 apache-commons-text: variable interpolation RCE 2136141 - CVE-2022-41853 hsqldb: Untrusted input may lead to RCE attack 5. Description: Bootstrap style library packaged for setuptools (easy_install) / pip. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: ipa security, bug fix, and enhancement update Advisory ID: RHSA-2020:3936-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3936 Issue date: 2020-09-29 CVE Names: CVE-2015-9251 CVE-2016-10735 CVE-2018-14040 CVE-2018-14042 CVE-2018-20676 CVE-2018-20677 CVE-2019-8331 CVE-2019-11358 CVE-2020-1722 CVE-2020-11022 ==================================================================== 1. Summary: An update for ipa is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. The following packages have been upgraded to a later upstream version: ipa (4.6.8). (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1399546 - CVE-2015-9251 js-jquery: Cross-site scripting via cross-domain ajax requests 1404770 - ID Views: do not allow custom Views for the masters 1545755 - ipa-replica-prepare should not update pki admin password. 1668082 - CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute 1668089 - CVE-2018-20677 bootstrap: XSS in the affix configuration target property 1668097 - CVE-2016-10735 bootstrap: XSS in the data-target attribute 1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute 1701972 - CVE-2019-11358 js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection 1754902 - Running ipa-server-install fails when RHEL 7.7 packages are installed on RHEL 7.6 1755535 - ipa-advise on a RHEL7 IdM server is not able to generate a configuration script for a RHEL8 IdM client 1756568 - ipa-server-certinstall man page does not match built-in help. 1758406 - KRA authentication fails when IPA CA has custom Subject DN 1769791 - Invisible part of notification area in Web UI intercepts clicks of some page elements 1771356 - Default client configuration breaks ssh in FIPS mode. 1780548 - Man page ipa-cacert-manage does not display correctly on RHEL 1782587 - add "systemctl restart sssd" to warning message when adding trust agents to replicas 1788718 - ipa-server-install incorrectly setting slew mode (-x) when setting up ntpd 1788907 - Renewed certs are not picked up by IPA CAs 1793071 - CVE-2020-1722 ipa: No password length restriction leads to denial of service 1795890 - ipa-pkinit-manage enable fails on replica if it doesn't host the CA 1801791 - Compatibility Schema difference in functionality for systems following RHEL 7.5 -> 7.6 upgrade path as opposed to new RHEL 7.6 systems 1817886 - ipa group-add-member: prevent adding IPA objects as external members 1817918 - Secure tomcat AJP connector 1817919 - Enable compat tree to provide information about AD users and groups on trust agents 1817922 - covscan memory leaks report 1817923 - IPA upgrade is failing with error "Failed to get request: bus, object_path and dbus_interface must not be None." 1817927 - host-add --password logs cleartext userpassword to Apache error log 1819725 - Rebase IPA to latest 4.6.x version 1825829 - ipa-advise on a RHEL7 IdM server generate a configuration script for client having hardcoded python3 1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method 1829787 - ipa service-del deletes the required principal when specified in lower/upper case 1834385 - Man page syntax issue detected by rpminspect 1842950 - ipa-adtrust-install fails when replica is offline 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: ipa-4.6.8-5.el7.src.rpm noarch: ipa-client-common-4.6.8-5.el7.noarch.rpm ipa-common-4.6.8-5.el7.noarch.rpm ipa-python-compat-4.6.8-5.el7.noarch.rpm python2-ipaclient-4.6.8-5.el7.noarch.rpm python2-ipalib-4.6.8-5.el7.noarch.rpm x86_64: ipa-client-4.6.8-5.el7.x86_64.rpm ipa-debuginfo-4.6.8-5.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: ipa-server-common-4.6.8-5.el7.noarch.rpm ipa-server-dns-4.6.8-5.el7.noarch.rpm python2-ipaserver-4.6.8-5.el7.noarch.rpm x86_64: ipa-debuginfo-4.6.8-5.el7.x86_64.rpm ipa-server-4.6.8-5.el7.x86_64.rpm ipa-server-trust-ad-4.6.8-5.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: ipa-4.6.8-5.el7.src.rpm noarch: ipa-client-common-4.6.8-5.el7.noarch.rpm ipa-common-4.6.8-5.el7.noarch.rpm ipa-python-compat-4.6.8-5.el7.noarch.rpm python2-ipaclient-4.6.8-5.el7.noarch.rpm python2-ipalib-4.6.8-5.el7.noarch.rpm x86_64: ipa-client-4.6.8-5.el7.x86_64.rpm ipa-debuginfo-4.6.8-5.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: ipa-server-common-4.6.8-5.el7.noarch.rpm ipa-server-dns-4.6.8-5.el7.noarch.rpm python2-ipaserver-4.6.8-5.el7.noarch.rpm x86_64: ipa-debuginfo-4.6.8-5.el7.x86_64.rpm ipa-server-4.6.8-5.el7.x86_64.rpm ipa-server-trust-ad-4.6.8-5.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: ipa-4.6.8-5.el7.src.rpm noarch: ipa-client-common-4.6.8-5.el7.noarch.rpm ipa-common-4.6.8-5.el7.noarch.rpm ipa-python-compat-4.6.8-5.el7.noarch.rpm ipa-server-common-4.6.8-5.el7.noarch.rpm ipa-server-dns-4.6.8-5.el7.noarch.rpm python2-ipaclient-4.6.8-5.el7.noarch.rpm python2-ipalib-4.6.8-5.el7.noarch.rpm python2-ipaserver-4.6.8-5.el7.noarch.rpm ppc64: ipa-client-4.6.8-5.el7.ppc64.rpm ipa-debuginfo-4.6.8-5.el7.ppc64.rpm ppc64le: ipa-client-4.6.8-5.el7.ppc64le.rpm ipa-debuginfo-4.6.8-5.el7.ppc64le.rpm s390x: ipa-client-4.6.8-5.el7.s390x.rpm ipa-debuginfo-4.6.8-5.el7.s390x.rpm x86_64: ipa-client-4.6.8-5.el7.x86_64.rpm ipa-debuginfo-4.6.8-5.el7.x86_64.rpm ipa-server-4.6.8-5.el7.x86_64.rpm ipa-server-trust-ad-4.6.8-5.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: ipa-4.6.8-5.el7.src.rpm noarch: ipa-client-common-4.6.8-5.el7.noarch.rpm ipa-common-4.6.8-5.el7.noarch.rpm ipa-python-compat-4.6.8-5.el7.noarch.rpm ipa-server-common-4.6.8-5.el7.noarch.rpm ipa-server-dns-4.6.8-5.el7.noarch.rpm python2-ipaclient-4.6.8-5.el7.noarch.rpm python2-ipalib-4.6.8-5.el7.noarch.rpm python2-ipaserver-4.6.8-5.el7.noarch.rpm x86_64: ipa-client-4.6.8-5.el7.x86_64.rpm ipa-debuginfo-4.6.8-5.el7.x86_64.rpm ipa-server-4.6.8-5.el7.x86_64.rpm ipa-server-trust-ad-4.6.8-5.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-9251 https://access.redhat.com/security/cve/CVE-2016-10735 https://access.redhat.com/security/cve/CVE-2018-14040 https://access.redhat.com/security/cve/CVE-2018-14042 https://access.redhat.com/security/cve/CVE-2018-20676 https://access.redhat.com/security/cve/CVE-2018-20677 https://access.redhat.com/security/cve/CVE-2019-8331 https://access.redhat.com/security/cve/CVE-2019-11358 https://access.redhat.com/security/cve/CVE-2020-1722 https://access.redhat.com/security/cve/CVE-2020-11022 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX3Of/9zjgjWX9erEAQjmHBAAi+u4CgMbaduuYvMAMbNKqT/0X8Y02udQ maW4rfZ6udfHWJ21h1VlD/INXHB3sBFC2vpXsgJD7dTkUsZYIx73LrQFkakTzIWc xSQalxNs+Fjh/ot/JMiKQzQUmZeu/vUYgVB81y+hczg5dys3q1mnu42GWe18sJIc FCY2R3mBTnFUZoc/3JDHeVRJU8eq51oqRgNaz+Fl+CoFkR81P6mD8wybIIAsBx14 Ykya/awQf+OuBCe5tqfTV1+KS2U4+tqiqapzALt7dhjfA9Jayc9/UvQjGCyrmGvP +BBBPSqGOS81jpPo0ouM3OtadWrGAWERMwtrR+POUp1rnMxy2kI0EpebnzSOtJy2 xExPZtcTjjgWvIMDdrJJ5DXG6cP5j3GjyvFknmCtCqvXzo90gw73psi6roG+g/a8 UyML+be8jnJK7571X3dz6OCYBExaHqM21ukUEfdvddszhw92J3fxmDm5+picETB9 dZ++VtV1lCBOlKW1SDG/ggk7PeSRGTDL5IkekopO1w89r3QsfqyFudlsNT0dDgk7 8Kzn8YpCWln1Kp0UbVushKRT+KllZRTKzXTBfiEWiYtQiwyL9zj/DrxagXXbiPe7 5mZnk62sAdKya3On4ejgPQ8Nq8oKHzRfaig/CNaNiB00HgZcRdQokPQ9+DRnkdNS UR3S5ZAZvb8=SWQt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Relevant releases/architectures: RHV-M 4.3 - noarch 3. Bug Fix(es): * Known moderate severity security vulnerability detected by GitHub on ovirt-web-ui components (BZ#1694032) 4. Description: Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link (you must log in to download the update)

Trust: 2.25

sources: NVD: CVE-2019-8331 // JVNDB: JVNDB-2019-001806 // VULHUB: VHN-159766 // VULMON: CVE-2019-8331 // PACKETSTORM: 170042 // PACKETSTORM: 170155 // PACKETSTORM: 159353 // PACKETSTORM: 154812 // PACKETSTORM: 153255

AFFECTED PRODUCTS

vendor:getbootstrapmodel:bootstrapscope:gteversion:4.3.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:virtualization managerscope:eqversion:4.3

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.1.2.5

Trust: 1.0

vendor:getbootstrapmodel:bootstrapscope:ltversion:4.3.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.2.5

Trust: 1.0

vendor:getbootstrapmodel:bootstrapscope:ltversion:3.4.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.2.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:12.1.5.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:13.1.3.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:tenablemodel:tenable.scscope:ltversion:5.19.0

Trust: 1.0

vendor:bootstrapmodel:bootstrapscope:eqversion:3.4.1

Trust: 0.8

vendor:bootstrapmodel:bootstrapscope:eqversion:4.3.1

Trust: 0.8

vendor:bootstrapmodel:bootstrapscope:eqversion: -

Trust: 0.8

vendor:bootstrapmodel:bootstrapscope:ltversion:4.3.x

Trust: 0.8

sources: JVNDB: JVNDB-2019-001806 // NVD: CVE-2019-8331

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-8331
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-8331
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201902-770
value: MEDIUM

Trust: 0.6

VULHUB: VHN-159766
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-8331
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-8331
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-159766
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-8331
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2019-8331
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-159766 // VULMON: CVE-2019-8331 // CNNVD: CNNVD-201902-770 // JVNDB: JVNDB-2019-001806 // NVD: CVE-2019-8331

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.1

problemtype:Cross-site scripting (CWE-79) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-159766 // JVNDB: JVNDB-2019-001806 // NVD: CVE-2019-8331

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 170042 // CNNVD: CNNVD-201902-770

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 170155 // CNNVD: CNNVD-201902-770

PATCH

title:v3.4.1url:https://github.com/twbs/bootstrap/pull/28236

Trust: 0.8

title:Bootstrap Fixes for cross-site scripting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=89568

Trust: 0.6

title:Red Hat: Moderate: Red Hat OpenStack 16.2.4 (python-XStatic-Bootstrap-SCSS) security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20228848 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: ovirt-web-ui security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193024 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenStack 16.1.9 (python-XStatic-Bootstrap-SCSS) security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20228865 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: python-XStatic-Bootstrap-SCSS security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20205571 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: ovirt-engine-ui-extensions security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193023 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2019-8331url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-8331

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM API Connect Developer Portal is affected by a cross site scripting vulnerability in Bootstrap (CVE-2019-8331)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=2caa270c4d58ec92fdaa81e47c7433a3

Trust: 0.1

title:Red Hat: Important: RHV Manager (ovirt-engine) 4.4 security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203247 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: idm:DL1 and idm:client security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204670 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: ipa security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203936 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Single Sign-On 7.3.2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191456 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204847 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Fuse 7.11.1 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20228652 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.4.9 Security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20230554 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.4.9 Security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20230556 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1519url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1519

Trust: 0.1

title:IBM: Security Bulletin: IBM License Key Server Administration and Reporting Tool is impacted by multiple vulnerabilities in jQuery, Bootstrap and AngularJSurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=06c81cfb59e5c7353b49e490f4b9142c

Trust: 0.1

title:IBM: Security Bulletin: Multiple vulnerability issues affect IBM Spectrum Conductor 2.5.0url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=0bf006d622ea4a9435b282864e760566

Trust: 0.1

title:IBM: Security Bulletin: Multiple vulnerability issues affect IBM Spectrum Symphony 7.3.1url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=c47c09015d1429df4a71453000607351

Trust: 0.1

title:Tenable Security Advisories: [R1] Tenable.sc 5.19.0 Fixes Multiple Third-party Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2021-14

Trust: 0.1

title: - url:https://github.com/Snorlyd/https-nj.gov---CVE-2019-8331

Trust: 0.1

title: - url:https://github.com/Thampakon/CVE-2019-8331

Trust: 0.1

sources: VULMON: CVE-2019-8331 // CNNVD: CNNVD-201902-770 // JVNDB: JVNDB-2019-001806

EXTERNAL IDS

db:NVDid:CVE-2019-8331

Trust: 3.9

db:PACKETSTORMid:156743

Trust: 1.7

db:BIDid:107375

Trust: 1.7

db:TENABLEid:TNS-2021-14

Trust: 1.7

db:PACKETSTORMid:159353

Trust: 0.8

db:PACKETSTORMid:170155

Trust: 0.8

db:PACKETSTORMid:170042

Trust: 0.8

db:JVNid:JVNVU94912830

Trust: 0.8

db:JVNDBid:JVNDB-2019-001806

Trust: 0.8

db:PACKETSTORMid:170823

Trust: 0.7

db:PACKETSTORMid:159852

Trust: 0.7

db:PACKETSTORMid:170821

Trust: 0.7

db:PACKETSTORMid:160568

Trust: 0.7

db:PACKETSTORMid:158750

Trust: 0.7

db:PACKETSTORMid:170154

Trust: 0.7

db:CNNVDid:CNNVD-201902-770

Trust: 0.7

db:PACKETSTORMid:154812

Trust: 0.7

db:AUSCERTid:ESB-2020.2694

Trust: 0.6

db:AUSCERTid:ESB-2022.6177

Trust: 0.6

db:AUSCERTid:ESB-2020.4453

Trust: 0.6

db:AUSCERTid:ESB-2023.3839

Trust: 0.6

db:AUSCERTid:ESB-2019.1251.2

Trust: 0.6

db:AUSCERTid:ESB-2020.3875

Trust: 0.6

db:AUSCERTid:ESB-2019.3808

Trust: 0.6

db:AUSCERTid:ESB-2022.0824

Trust: 0.6

db:AUSCERTid:ESB-2023.0585

Trust: 0.6

db:AUSCERTid:ESB-2023.0583

Trust: 0.6

db:AUSCERTid:ESB-2019.1171

Trust: 0.6

db:AUSCERTid:ESB-2021.2515

Trust: 0.6

db:AUSCERTid:ESB-2019.2074

Trust: 0.6

db:AUSCERTid:ESB-2020.3368

Trust: 0.6

db:AUSCERTid:ESB-2020.3902

Trust: 0.6

db:CS-HELPid:SB2022022516

Trust: 0.6

db:CS-HELPid:SB2021072292

Trust: 0.6

db:PACKETSTORMid:159876

Trust: 0.1

db:PACKETSTORMid:170819

Trust: 0.1

db:PACKETSTORMid:170817

Trust: 0.1

db:VULHUBid:VHN-159766

Trust: 0.1

db:VULMONid:CVE-2019-8331

Trust: 0.1

db:PACKETSTORMid:153255

Trust: 0.1

sources: VULHUB: VHN-159766 // VULMON: CVE-2019-8331 // PACKETSTORM: 170042 // PACKETSTORM: 170155 // PACKETSTORM: 159353 // PACKETSTORM: 154812 // PACKETSTORM: 153255 // CNNVD: CNNVD-201902-770 // JVNDB: JVNDB-2019-001806 // NVD: CVE-2019-8331

REFERENCES

url:https://access.redhat.com/errata/rhsa-2019:1456

Trust: 2.4

url:http://www.securityfocus.com/bid/107375

Trust: 2.3

url:http://packetstormsecurity.com/files/156743/octobercms-insecure-dependencies.html

Trust: 2.3

url:https://access.redhat.com/errata/rhsa-2019:3023

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8331

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:3024

Trust: 1.8

url:https://seclists.org/bugtraq/2019/may/18

Trust: 1.7

url:https://www.tenable.com/security/tns-2021-14

Trust: 1.7

url:https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/

Trust: 1.7

url:https://support.f5.com/csp/article/k24383845

Trust: 1.7

url:http://seclists.org/fulldisclosure/2019/may/13

Trust: 1.7

url:http://seclists.org/fulldisclosure/2019/may/11

Trust: 1.7

url:http://seclists.org/fulldisclosure/2019/may/10

Trust: 1.7

url:https://github.com/twbs/bootstrap/pull/28236

Trust: 1.7

url:https://github.com/twbs/bootstrap/releases/tag/v3.4.1

Trust: 1.7

url:https://github.com/twbs/bootstrap/releases/tag/v4.3.1

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpuapr2021.html

Trust: 1.7

url:https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3cdev.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3cissues.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3cdev.drill.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3cuser.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3cuser.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3cdev.superset.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3cdev.drill.apache.org%3e

Trust: 1.0

url:https://support.f5.com/csp/article/k24383845?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.0

url:https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3cuser.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://jvn.jp/vu/jvnvu94912830/

Trust: 0.8

url:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3cdev.drill.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3cdev.drill.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3cissues.drill.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3cdev.flink.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3cuser.flink.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3cuser.flink.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3cuser.flink.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3ccommits.pulsar.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3cdev.superset.apache.org%3e

Trust: 0.7

url:https://support.f5.com/csp/article/k24383845?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://github.com/twbs/bootstrap/releases/tag/v4.3.1release notesthird party advisory

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:https://packetstormsecurity.com/files/159353/red-hat-security-advisory-2020-3936-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78918

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2515

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022022516

Trust: 0.6

url:https://packetstormsecurity.com/files/158750/red-hat-security-advisory-2020-3247-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/170155/red-hat-security-advisory-2022-8848-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3839

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6177

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1251.2/

Trust: 0.6

url:https://packetstormsecurity.com/files/154812/red-hat-security-advisory-2019-3024-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-oss-scan-fixes-for-content-pos/

Trust: 0.6

url:https://packetstormsecurity.com/files/160568/red-hat-security-advisory-2020-5571-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3875/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6520510

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072292

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10879483

Trust: 0.6

url:https://packetstormsecurity.com/files/170042/red-hat-security-advisory-2022-8652-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3902/

Trust: 0.6

url:https://packetstormsecurity.com/files/170821/red-hat-security-advisory-2023-0552-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0585

Trust: 0.6

url:https://packetstormsecurity.com/files/159852/red-hat-security-advisory-2020-4847-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-information-queue-uses-components-with-known-vulnerabilities-cve-2019-8331-cve-2019-11358/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3808/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2694/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4453/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0583

Trust: 0.6

url:https://packetstormsecurity.com/files/170154/red-hat-security-advisory-2022-8865-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-license-key-server-administration-and-reporting-tool-is-impacted-by-multiple-vulnerabilities-in-jquery-bootstrap-and-angularjs/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerability-issues-affect-ibm-spectrum-symphony-7-3-1/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78550

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2074/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0824

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3368/

Trust: 0.6

url:https://packetstormsecurity.com/files/170823/red-hat-security-advisory-2023-0553-01.html

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-8331

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-11358

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-11358

Trust: 0.3

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20676

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-10735

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20676

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20677

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20677

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-10735

Trust: 0.2

url:https://support.f5.com/csp/article/k24383845?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2053

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31129

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3717

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24785

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2048

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31684

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24785

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3717

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-33980

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2048

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-33980

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31684

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2053

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41853

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25857

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24723

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0613

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24723

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25857

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14042

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-9251

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1722

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11022

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-9251

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14040

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3936

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11022

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10744

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10744

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3875

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10157

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3873

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14041

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14041

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3888

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.rhsso&downloadtype=securitypatches&version=7.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3872

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3873

Trust: 0.1

sources: VULHUB: VHN-159766 // PACKETSTORM: 170042 // PACKETSTORM: 170155 // PACKETSTORM: 159353 // PACKETSTORM: 154812 // PACKETSTORM: 153255 // CNNVD: CNNVD-201902-770 // JVNDB: JVNDB-2019-001806 // NVD: CVE-2019-8331

CREDITS

Red Hat,The vendor reported this issue.,SECURELI.com

Trust: 0.6

sources: CNNVD: CNNVD-201902-770

SOURCES

db:VULHUBid:VHN-159766
db:VULMONid:CVE-2019-8331
db:PACKETSTORMid:170042
db:PACKETSTORMid:170155
db:PACKETSTORMid:159353
db:PACKETSTORMid:154812
db:PACKETSTORMid:153255
db:CNNVDid:CNNVD-201902-770
db:JVNDBid:JVNDB-2019-001806
db:NVDid:CVE-2019-8331

LAST UPDATE DATE

2025-10-20T03:13:06.866000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-159766date:2019-06-11T00:00:00
db:VULMONid:CVE-2019-8331date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201902-770date:2023-07-10T00:00:00
db:JVNDBid:JVNDB-2019-001806date:2022-02-16T03:20:00
db:NVDid:CVE-2019-8331date:2024-11-21T04:49:42.020

SOURCES RELEASE DATE

db:VULHUBid:VHN-159766date:2019-02-20T00:00:00
db:VULMONid:CVE-2019-8331date:2019-02-20T00:00:00
db:PACKETSTORMid:170042date:2022-11-29T16:03:19
db:PACKETSTORMid:170155date:2022-12-08T16:28:14
db:PACKETSTORMid:159353date:2020-09-30T15:44:20
db:PACKETSTORMid:154812date:2019-10-11T15:03:31
db:PACKETSTORMid:153255date:2019-06-11T10:33:22
db:CNNVDid:CNNVD-201902-770date:2019-02-20T00:00:00
db:JVNDBid:JVNDB-2019-001806date:2019-03-27T00:00:00
db:NVDid:CVE-2019-8331date:2019-02-20T16:29:00.837