VARIoT IoT vulnerabilities database

VAR-201910-1695 | CVE-2019-15274 | Cisco TelePresence Collaboration Endpoint In software OS Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to perform command injections. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as an administrative level user within the restricted shell and submitting malicious input to a specific command. A successful exploit could allow the attacker to execute previously staged code from the underlying filesystem
VAR-201910-0955 | CVE-2019-15277 | Cisco TelePresence Collaboration Endpoint Permission management vulnerability in software |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to execute code with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as the remote support user and sending malicious traffic to a listener who is internal to the device. A successful exploit could allow the attacker to execute commands with root privileges
VAR-201910-0954 | CVE-2019-15275 | Cisco TelePresence Collaboration Endpoint Permission management vulnerability in software |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as the remote support user and submitting malicious input to a specific command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system (OS) with root privileges
VAR-201910-0953 | CVE-2019-15273 | Cisco TelePresence Collaboration Endpoint Permission management vulnerability in software |
CVSS V2: 6.6 CVSS V3: 4.4 Severity: MEDIUM |
Multiple vulnerabilities in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to overwrite arbitrary files. The vulnerabilities are due to insufficient permission enforcement. An attacker could exploit these vulnerabilities by authenticating as the remote support user and submitting malicious input to specific commands. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying filesystem. The attacker has no control over the contents of the data written to the file. Overwriting a critical file could cause the device to crash, resulting in a denial of service condition (DoS)
VAR-201910-0876 | CVE-2019-17627 | Yale Bluetooth Key Authentication vulnerabilities in applications |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
The Yale Bluetooth Key application for mobile devices allows unauthorized unlock actions by sniffing Bluetooth Low Energy (BLE) traffic during one authorized unlock action, and then calculating the authentication key via simple computations on the hex digits of a valid authentication request. This affects the Yale ZEN-R lock and unspecified other locks. Yale Bluetooth Key The application contains authentication vulnerabilities.Information may be obtained
VAR-201910-1856 | No CVE | DLink DIR-878 has arbitrary file reading vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
DIR-878 adopts IEEE802.11ac WAVE 2 wireless technology, and MU-MIMO technology for simultaneous multi-person networking, dual-band wireless transmission / reception up to 1900Mbps, low-interference, transmission rate up to 1300Mbps 5GHz band wireless network environment.
DLink DIR-878 has an arbitrary file reading vulnerability. An attacker could use the vulnerability to read arbitrary file sensitive information.
VAR-201910-1863 | CVE-2019-17411 | Intelbras Router WRN150 Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Intelbras Router WRN150 is a wireless router from Brazil's Intelbras.
Intelbras Router WRN150 has a cross-site scripting vulnerability. An attacker could exploit the vulnerability to execute arbitrary script code in the context of an affected site. This allows attackers to steal cookie-based authentication credentials and launch other attacks.
VAR-201910-0729 | CVE-2019-17600 | Intelbras IWR 1000N Cross-Site Request Forgery Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Intelbras IWR 1000N 1.6.4 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled. Intelbras IWR 1000N The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intelbras IWR 1000N is a wireless router of Polish Intelbras company.
Intelbras IWR 1000N has a cross-site request forgery vulnerability. The vulnerability stems from the fact that the WEB application did not fully verify whether the request came from a trusted user. An attacker could use this vulnerability to send unexpected requests to the server through the affected client
VAR-201910-1730 | CVE-2019-17195 | Connect2id Nimbus JOSE+JWT Vulnerabilities related to exceptional state checking |
CVSS V2: 6.8 CVSS V3: 9.8 Severity: CRITICAL |
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass. Connect2id Nimbus JOSE+JWT Contains an exceptional condition check vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Description:
The org.ovirt.engine-root is a core component of oVirt.
The following packages have been upgraded to a later upstream version:
org.ovirt.engine-root (4.3.8.2), ovirt-engine-dwh (4.3.8),
ovirt-engine-metrics (1.3.6.1), ovirt-fast-forward-upgrade (1.0.0),
ovirt-imageio-common (1.5.3), ovirt-imageio-proxy (1.5.3), ovirt-web-ui
(1.6.0), rhv-log-collector-analyzer (0.2.15), v2v-conversion-host (1.16.0).
Bug Fix(es):
* [downstream clone - 4.4.0] Upgrade from 4.3 to 4.4 will fail if there are
versioned templates in database (BZ#1688781)
* [ovirt-fast-forward-upgrade] Error:
ovirt-engine-setup-plugin-ovirt-engine conflicts with
ovirt-engine-4.2.5.2-0.1.el7ev.noarch (BZ#1754979)
* Users immediately logged out from User portal due to negative
UserSessionTimeOutInterval (BZ#1757423)
* Fluentd error when stopping metrics services through playbook on 4.3
(BZ#1772506)
* [downstream clone - 4.3.8] From VM Portal, users cannot create Operating
System Windows VM. (BZ#1780234)
Enhancement(s):
* RFE for offline installation of RHV Metrics Store (BZ#1711873)
* [RFE] Compare storage with database for discrepancies (BZ#1739106)
* [RFE] RHV+Metrics Store - Support a Flat DNS environment without
subdomains (BZ#1782412)
4. Bugs fixed (https://bugzilla.redhat.com/):
1752522 - ovirt-fast-forward-upgrade: Upgrade from 4.2 to 4.3 fails with UnicodeEncodeError
1764791 - CVE-2019-17195 nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
1789737 - Import of OVA created from template fails with java.lang.NullPointerException [RHV clone - 4.3.9]
1792874 - Hide partial engine-cleanup option [RHV clone - 4.3.9]
1797496 - Add RHCOS os to osinfo - for compatability API between 4.3 to 4.4
1801310 - Module ovirt disk parameter storage domain has default option in documentation
1808038 - Unable to change Graphical Console of HE VM. [RHV clone - 4.3.9]
1808607 - RHVM 4.3.8.2 has Security Vulnerability Tenable Plugin ID 133165 in apache-commons-beanutils-1.8.3-14.el7
1809470 - [HE] ovirt-provider-ovn is non-functional on 4.3.9 Hosted-Engine [RHV clone - 4.3.9]
1810527 - Upgrade rhvm-dependencies to 4.3.2
6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: RHV Manager (ovirt-engine) 4.4 security, bug fix, and enhancement update
Advisory ID: RHSA-2020:3247-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3247
Issue date: 2020-08-04
CVE Names: CVE-2017-18635 CVE-2019-8331 CVE-2019-10086
CVE-2019-13990 CVE-2019-17195 CVE-2019-19336
CVE-2020-7598 CVE-2020-10775 CVE-2020-11022
CVE-2020-11023
=====================================================================
1. Summary:
Updated ovirt-engine packages that fix several bugs and add various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4 - noarch, x86_64
3. Description:
The ovirt-engine package provides the Red Hat Virtualization Manager, a
centralized management platform that allows system administrators to view
and manage virtual machines. The Manager provides a comprehensive range of
features including search capabilities, resource management, live
migrations, and virtual infrastructure provisioning.
The Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a VM Portal, and a
Representational State Transfer (REST) Application Programming Interface
(API).
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/ht
ml-single/technical_notes
Security Fix(es):
* apache-commons-beanutils: does not suppresses the class property in
PropertyUtilsBean by default (CVE-2019-10086)
* libquartz: XXE attacks via job description (CVE-2019-13990)
* novnc: XSS vulnerability via the messages propagated to the status field
(CVE-2017-18635)
* bootstrap: XSS in the tooltip or popover data-template attribute
(CVE-2019-8331)
* nimbus-jose-jwt: Uncaught exceptions while parsing a JWT (CVE-2019-17195)
* ovirt-engine: response_type parameter allows reflected XSS
(CVE-2019-19336)
* nodejs-minimist: prototype pollution allows adding or modifying
properties of Object.prototype using a constructor or __proto__ payload
(CVE-2020-7598)
* ovirt-engine: Redirect to arbitrary URL allows for phishing
(CVE-2020-10775)
* Cross-site scripting due to improper injQuery.htmlPrefilter method
(CVE-2020-11022)
* jQuery: passing HTML containing <option> elements to manipulation methods
could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/2974891
5. Bugs fixed (https://bugzilla.redhat.com/):
1080097 - [RFE] Allow editing disks details in the Disks tab
1325468 - [RFE] Autostart of VMs that are down (with Engine assistance - Engine has to be up)
1358501 - [RFE] multihost network change - notify when done
1427717 - [RFE] Create and/or select affinity group upon VM creation.
1475774 - RHV-M requesting four GetDeviceListVDSCommand when editing storage domain
1507438 - not able to deploy new rhvh host when "/tmp" is mounted with "noexec" option
1523835 - Hosted-Engine: memory hotplug does not work for engine vm
1527843 - [Tracker] Q35 chipset support (with seabios)
1529042 - [RFE] Changing of Cluster CPU Type does not trigger config update notification
1535796 - Undeployment of HE is not graceful
1546838 - [RFE] Refuse to deploy on localhost.localdomain
1547937 - [RFE] Live Storage Migration progress bar.
1585986 - [HE] When lowering the cluster compatibility, we need to force update the HE storage OVF store to ensure it can start up (migration will not work).
1593800 - [RFE] forbid new mac pools with overlapping ranges
1596178 - inconsistent display between automatic and manual Pool Type
1600059 - [RFE] Add by default a storage lease to HA VMs
1610212 - After updating to RHV 4.1 while trying to edit the disk, getting error "Cannot edit Virtual Disk. Cannot edit Virtual Disk. Disk extension combined with disk compat version update isn't supported. Please perform the updates separately."
1611395 - Unable to list Compute Templates in RHV 4.2 from Satellite 6.3.2
1616451 - [UI] add a tooltip to explain the supported matrix for the combination of disk allocation policies, formats and the combination result
1637172 - Live Merge hung in the volume deletion phase, leaving snapshot in a LOCKED state
1640908 - Javascript Error popup when Managing StorageDomain with LUNs and 400+ paths
1642273 - [UI] - left nav border highlight missing in RHV
1647440 - [RFE][UI] Provide information about the VM next run
1648345 - Jobs are not properly cleaned after a failed task.
1650417 - HA is broken for VMs having disks in NFS storage domain because of Qemu OFD locking
1650505 - Increase of ClusterCompatibilityVersion to Cluster with virtual machines with outstanding configuration changes, those changes will be reverted
1651406 - [RFE] Allow Maintenance of Host with Enforcing VM Affinity Rules (hard affinity)
1651939 - a new size of the direct LUN not updated in Admin Portal
1654069 - [Downstream Clone] [UI] - grids bottom scrollbar hides bottom row
1654889 - [RFE] Support console VNC for mediated devices
1656621 - Importing VM OVA always enables 'Cloud-Init/Sysprep'
1658101 - [RESTAPI] Adding ISO disables serial console
1659161 - Unable to edit pool that is delete protected
1660071 - Regression in Migration of VM that starts in pause mode: took 11 hours
1660644 - Concurrent LSMs of the same disk can be issued via the REST-API
1663366 - USB selection option disabled even though USB support is enabled in RHV-4.2
1664479 - Third VM fails to get migrated when host is placed into maintenance mode
1666913 - [UI] warn users about different "Vdsm Name" when creating network with a fancy char or long name
1670102 - [CinderLib] - openstack-cinder and cinderlib packages are not installed on ovirt-engine machine
1671876 - "Bond Active Slave" parameter on RHV-M GUI shows an incorrect until Refresh Caps
1679039 - Unable to upload image through Storage->Domain->Disk because of wrong DC
1679110 - [RFE] change Admin Portal toast notifications location
1679471 - [ja, de, es, fr, pt_BR] The console client resources page shows truncated title for some locales
1679730 - Warn about host IP addresses outside range
1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute
1686650 - Memory snapshots' deletion logging unnecessary WARNINGS in engine.log
1687345 - Snapshot with memory volumes can fail if the memory dump takes more than 180 seconds
1690026 - [RFE] - Creating an NFS storage domain the engine should let the user specify exact NFS version v4.0 and not just v4
1690155 - Disk migration progress bar not clearly visible and unusable.
1690475 - When a live storage migration fails, the auto generated snapshot does not get removed
1691562 - Cluster level changes are not increasing VMs generation numbers and so a new OVF_STORE content is not copied to the shared storage
1692592 - "Enable menu to select boot device shows 10 device listed with cdrom at 10th slot but when selecting 10 option the VM took 1 as option and boot with disk
1693628 - Engine generates too many updates to vm_dynamic table due to the session change
1693813 - Do not change DC level if there are VMs running/paused with older CL.
1695026 - Failure in creating snapshots during "Live Storage Migration" can result in a nonexistent snapshot
1695635 - [RFE] Improve Host Drop-down menu in different Dialogs (i.e. Alphabetical sort of Hosts in Remove|New StorageDomains)
1696245 - [RFE] Allow full customization while cloning a VM
1696669 - Build bouncycastle for RHV 4.4 RHEL 8
1696676 - Build ebay-cors-filter for RHV 4.4 RHEL 8
1698009 - Build openstack-java-sdk for RHV 4.4 RHEL 8
1698102 - Print a warning message to engine-setup, which highlights that other clusters than the Default one are not modified to use ovirt-provider-ovn as the default network provider
1700021 - [RFE] engine-setup should warn and prompt if ca.pem is missing but other generated pki files exist
1700036 - [RFE] Add RedFish API for host power management for RHEV
1700319 - VM is going to pause state with "storage I/O error".
1700338 - [RFE] Alternate method to configure the email Event Notifier for a user in RHV through API (instead of RHV GUI)
1700725 - [scale] RHV-M runs out of memory due to to much data reported by the guest agent
1700867 - Build makeself for RHV 4.4 RHEL 8
1701476 - Build unboundid-ldapsdk for RHV 4.4 RHEL 8
1701491 - Build RHV-M 4.4 - RHEL 8
1701522 - Build ovirt-imageio-proxy for RHV 4.4 / RHEL 8
1701528 - Build / Tag python-ovsdbapp for RHV 4.4 RHEL 8
1701530 - Build / Tag ovirt-cockpit-sso for RHV 4.4 RHEL 8
1701531 - Build / Tag ovirt-engine-api-explorer for RHV 4.4 RHEL 8
1701533 - Build / Tag ovirt-engine-dwh for RHV 4.4 / RHEL 8
1701538 - Build / Tag vdsm-jsonrpc-java for RHV 4.4 RHEL 8
1701544 - Build rhvm-dependencies for RHV 4.4 RHEL 8
1702310 - Build / Tag ovirt-engine-ui-extensions for RHV 4.4 RHEL 8
1702312 - Build ovirt-log-collector for RHV 4.4 RHEL 8
1703112 - PCI address of NICs are not stored in the database after a hotplug of passthrough NIC resulting in change of network device name in VM after a reboot
1703428 - VMs migrated from KVM to RHV show warning 'The latest guest agent needs to be installed and running on the guest'
1707225 - [cinderlib] Cinderlib DB is missing a backup and restore option
1708624 - Build rhvm-setup-plugins for RHV 4.4 - RHEL 8
1710491 - No EVENT_ID is generated in /var/log/ovirt-engine/engine.log when VM is rebooted from OS level itself.
1711006 - Metrics installation fails during the execution of playbook ovirt-metrics-store-installation if the environment is not having DHCP
1712255 - Drop 4.1 datacenter/cluster level
1712746 - [RFE] Ignition support for ovirt vms
1712890 - engine-setup should check for snapshots in unsupported CL
1714528 - Missing IDs on cluster upgrade buttons
1714633 - Using more than one asterisk in the search string is not working when searching for users.
1714834 - Cannot disable SCSI passthrough using API
1715725 - Sending credentials in query string logs them in ovirt-request-logs
1716590 - [RFE][UX] Make Cluster-wide "Custom serial number policy" value visible at VM level
1718818 - [RFE] Enhance local disk passthrough
1720686 - Tag ovirt-scheduler-proxy for RHV 4.4 RHEL 8
1720694 - Build ovirt-engine-extension-aaa-jdbc for RHV 4.4 RHEL 8
1720795 - New guest tools are available mark in case of guest tool located on Data Domain
1724959 - RHV recommends reporting issues to GitHub rather than access.redhat.com (ovirt->RHV rebrand glitch?)
1727025 - NPE in DestroyImage endAction during live merge leaving a task in DB for hours causing operations depending on host clean tasks to fail as Deactivate host/StopSPM/deactivate SD
1728472 - Engine reports network out of sync due to ipv6 default gateway via ND RA on a non default route network.
1729511 - engine-setup fails to upgrade to 4.3 with Unicode characters in CA subject
1729811 - [scale] updatevmdynamic broken if too many users logged in - psql ERROR: value too long for type character varying(255)
1730264 - VMs will fail to start if the vnic profile attached is having port mirroring enabled and have name greater than 15 characters
1730436 - Snapshot creation was successful, but snapshot remains locked
1731212 - RHV 4.4 landing page does not show login or allow scrolling.
1731590 - Cannot preview snapshot, it fails and VM remains locked.
1733031 - [RFE] Add warning when importing data domains to newer DC that may trigger SD format upgrade
1733529 - Consume python-ovsdbapp dependencies from OSP in RHEL 8 RHV 4.4
1733843 - Export to OVA fails if VM is running on the Host doing the export
1734839 - Unable to start guests in our Power9 cluster without running in headless mode.
1737234 - Attach a non-existent ISO to vm by the API return 201 and marks the Attach CD checkbox as ON
1737684 - Engine deletes the leaf volume when SnapshotVDSCommand timed out without checking if the volume is still used by the VM
1740978 - [RFE] Warn or Block importing VMs/Templates from unsupported compatibility levels.
1741102 - host activation causes RHHI nodes to lose the quorum
1741271 - Move/Copy disk are blocked if there is less space in source SD than the size of the disk
1741625 - VM fails to be re-started with error: Failed to acquire lock: No space left on device
1743690 - Commit and Undo buttons active when no snapshot selected
1744557 - RHV 4.3 throws an exception when trying to access VMs which have snapshots from unsupported compatibility levels
1745384 - [IPv6 Static] Engine should allow updating network's static ipv6gateway
1745504 - Tag rhv-log-collector-analyzer for RHV 4.4 RHEL 8
1746272 - [BREW BUILD ENABLER] Build the oVirt Ansible roles for RHV 4.4.0
1746430 - [Rebase] Rebase v2v-conversion-host for RHV 4.4 Engine
1746877 - [Metrics] Rebase bug - for the 4.4 release on EL8
1747772 - Extra white space at the top of webadmin dialogs
1749284 - Change the Snapshot operation to be asynchronous
1749944 - teardownImage attempts to deactivate in-use LV's rendering the VM disk image/volumes in locked state.
1750212 - MERGE_STATUS fails with 'Invalid UUID string: mapper' when Direct LUN that already exists is hot-plugged
1750348 - [Tracking] rhvm-branding-rhv for RHV 4.4
1750357 - [Tracking] ovirt-web-ui for RHV 4.4
1750371 - [Tracking] ovirt-engine-ui-extensions for RHV 4.4
1750482 - From VM Portal, users cannot create Operating System Windows VM.
1751215 - Unable to change Graphical Console of HE VM.
1751268 - add links to Insights to landing page
1751423 - Improve description of shared memory statistics and remove unimplemented memory metrics from API
1752890 - Build / Tag ovirt-engine-extension-aaa-ldap for RHV 4.4 RHEL 8
1752995 - [RFE] Need to be able to set default console option
1753629 - Build / Tag ovirt-engine-extension-aaa-misc for RHV 4.4 RHEL 8
1753661 - Build / Tag ovirt-engine-extension-logger-log4j got RHV 4.4 / RHEl 8
1753664 - Build ovirt-fast-forward-upgrade for RHV 4.4 /RHEL 8 support
1754363 - [Scale] Engine generates excessive amount of dns configuration related sql queries
1754490 - RHV Manager cannot start on EAP 7.2.4
1755412 - Setting "oreg_url: registry.redhat.io" fails with error
1758048 - clone(as thin) VM from template or create snapshot fails with 'Requested capacity 1073741824 < parent capacity 3221225472 (volume:1211)'
1758289 - [Warn] Duplicate chassis entries in southbound database if the host is down while removing the host from Manager
1762281 - Import of OVA created from template fails with java.lang.NullPointerException
1763992 - [RFE] Show "Open Console" as the main option in the VM actions menu
1764289 - Document details how each fence agent can be configured in RESTAPI
1764791 - CVE-2019-17195 nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
1764932 - [BREW BUILD ENABLER] Build the ansible-runner-service for RHV 4.4
1764943 - Create Snapshot does not proceed beyond CreateVolume
1764959 - Apache is configured to offer TRACE method (security)
1765660 - CVE-2017-18635 novnc: XSS vulnerability via the messages propagated to the status field
1767319 - [RFE] forbid updating mac pool that contains ranges overlapping with any mac range in the system
1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
1768707 - Cannot set or update iscsi portal group tag when editing storage connection via API
1768844 - RHEL Advanced virtualization module streams support
1769463 - [Scale] Slow performance for api/clusters when many networks devices are present
1770237 - Cannot assign a vNIC profile for VM instance profile.
1771793 - VM Portal crashes in what appears to be a permission related problem.
1773313 - RHV Metric store installation fails with error: "You need to install \"jmespath\" prior to running json_query filter"
1777954 - VM Templates greater then 101 quantity are not listed/reported in RHV-M Webadmin UI.
1779580 - drop rhvm-doc package
1781001 - CVE-2019-19336 ovirt-engine: response_type parameter allows reflected XSS
1782236 - Windows Update (the drivers) enablement
1782279 - Warning message for low space is not received on Imported Storage domain
1782882 - qemu-kvm: kvm_init_vcpu failed: Function not implemented
1784049 - Rhel6 guest with cluster default q35 chipset causes kernel panic
1784385 - Still requiring rhvm-doc in rhvm-setup-plugins
1785750 - [RFE] Ability to change default VM action (Suspend) in the VM Portal.
1788424 - Importing a VM having direct LUN attached using virtio driver is failing with error "VirtIO-SCSI is disabled for the VM"
1796809 - Build apache-sshd for RHV 4.4 RHEL 8
1796811 - Remove bundled apache-sshd library
1796815 - Build snmp4j for RHV 4.4 RHEL 8
1796817 - Remove bundled snmp4j library
1797316 - Snapshot creation from VM fails on second snapshot and afterwords
1797500 - Add disk operation failed to complete.
1798114 - Build apache-commons-digester for RHV 4.4 RHEL 8
1798117 - Build apache-commons-configuration for RHV 4.4 RHEL 8
1798120 - Build apache-commons-jexl for RHV 4.4 RHEL 8
1798127 - Build apache-commons-collections4 for RHV 4.4 RHEL 8
1798137 - Build apache-commons-vfs for RHV 4.4 RHEL 8
1799171 - Build ws-commons-util for RHV 4.4 RHEL 8
1799204 - Build xmlrpc for RHV 4.4 RHEL 8
1801149 - CVE-2019-13990 libquartz: XXE attacks via job description
1801709 - Disable activation of the host while Enroll certificate flow is still in progress
1803597 - rhv-image-discrepancies should skip storage domains in maintenance mode and ISO/Export
1805669 - change requirement on rhvm package from spice-client-msi to spice-client-win
1806276 - [HE] ovirt-provider-ovn is non-functional on 4.3.9 Hosted-Engine
1807047 - Build m2crypto for RHV 4.4 RHEL 8
1807860 - [RFE] Allow resource allocation options to be customized
1808096 - Uploading ISOs causes "Uncaught exception occurred. Please try reloading the page. Details: (TypeError) : a.n is null"
1808126 - host_service.install() does not work with deploy_hosted_engine as True.
1809040 - [CNV&RHV] let the user know that token is not valid anymore
1809052 - [CNV&RHV] ovirt-engine log file spammed by failed timers ( approx 3-5 messages/sec )
1809875 - rhv-image-discrepancies only compares images on the last DC
1809877 - rhv-image-discrepancies sends dump-volume-chains with parameter that is ignored
1810893 - mountOptions is ignored for "import storage domain" from GUI
1811865 - [Scale] Host Monitoring generates excessive amount of qos related sql queries
1811869 - [Scale] Webadmin\REST for host interface list response time is too long because of excessive amount of qos related sql queries
1812875 - Unable to create VMs when french Language is selected for the rhvm gui.
1813305 - Engine updating SLA policies of VMs continuously in an environment which is not having any QOS configured
1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload
1814197 - [CNV&RHV] when provider is remover DC is left behind and active
1814215 - [CNV&RHV] Adding new provider to engine fails after succesfull test
1816017 - Build log4j12 for RHV 4.4 EL8
1816643 - [CNV&RHV] VM created in CNV not visible in RHV
1816654 - [CNV&RHV] adding provider with already created vm failed
1816693 - [CNV&RHV] CNV VM failed to restart even if 1st dialog looks fine
1816739 - [CNV&RHV] CNV VM updated form CNV side doesn't update vm properties over on RHV side
1817467 - [Tracking] Migration path between RHV 4.3 and 4.4
1818745 - rhv-log-collector-analyzer 0.2.17 still requires pyhton2
1819201 - [CodeChange][i18n] oVirt 4.4 rhv branding - translation update
1819248 - Cannot upgrade host after engine setup
1819514 - Failed to register 4.4 host to the latest engine (4.4.0-0.29.master.el8ev)
1819960 - NPE on ImportVmTemplateFromConfigurationCommand when creating VM from ovf_data
1820621 - Build apache-commons-compress for RHV 4.4 EL8
1820638 - Build apache-commons-jxpath for RHV 4.4 EL8
1821164 - Failed snapshot creation can cause data corruption of other VMs
1821930 - Enable only TLSv1.2+ protocol for SPICE on EL7 hosts
1824095 - VM portal shows only error
1825793 - RHV branding is missing after upgrade from 4.3
1826248 - [4.4][ovirt-cockpit-sso] Compatibility issues with python3
1826437 - The console client resources page return HTTP code 500
1826801 - [CNV&RHV] update of memory on cnv side does not propagate to rhv
1826855 - [cnv&rhv] update of cpu on cnv side causing expetion in engine.log
1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
1828669 - After SPM select the engine lost communication to all hosts until restarted [improved logging]
1828736 - [CNV&RHV] cnv template is not propagated to rhv
1829189 - engine-setup httpd ssl configuration conflicts with Red Hat Insights
1829656 - Failed to register 4.3 host to 4.4 engine with 4.3 cluster (4.4.0-0.33.master.el8ev)
1829830 - vhost custom properties does not accept '-'
1832161 - rhv-log-collector-analyzer fails with UnicodeDecodeError on RHEL8
1834523 - Edit VM -> Enable Smartcard sharing does not stick when VM is running
1838493 - Live snapshot made with freeze in the engine will cause the FS to be frozen
1841495 - Upgrade openstack-java-sdk to 3.2.9
1842495 - high cpu usage after entering wrong search pattern in RHVM
1844270 - [vGPU] nodisplay option for mdev broken since mdev scheduling unit
1844855 - Missing images (favicon.ico, banner logo) and missing brand.css file on VM portal d/s installation
1845473 - Exporting an OVA file from a VM results in its ovf file having a format of RAW when the disk is COW
1847420 - CVE-2020-10775 ovirt-engine: Redirect to arbitrary URL allows for phishing
1850004 - CVE-2020-11023 jQuery: passing HTML containing <option> elements to manipulation methods could result in untrusted code execution
1853444 - [CodeChange][i18n] oVirt 4.4 rhv branding - translation update (July-2020)
1854563 - [4.4 downstream only][RFE] Include a link to grafana on front page
6. Package List:
RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4:
Source:
ansible-runner-1.4.5-1.el8ar.src.rpm
ansible-runner-service-1.0.2-1.el8ev.src.rpm
apache-commons-collections4-4.4-1.el8ev.src.rpm
apache-commons-compress-1.18-1.el8ev.src.rpm
apache-commons-configuration-1.10-1.el8ev.src.rpm
apache-commons-jexl-2.1.1-1.el8ev.src.rpm
apache-commons-jxpath-1.3-29.el8ev.src.rpm
apache-commons-vfs-2.4.1-1.el8ev.src.rpm
apache-sshd-2.5.1-1.el8ev.src.rpm
ebay-cors-filter-1.0.1-4.el8ev.src.rpm
ed25519-java-0.3.0-1.el8ev.src.rpm
engine-db-query-1.6.1-1.el8ev.src.rpm
java-client-kubevirt-0.5.0-1.el8ev.src.rpm
log4j12-1.2.17-22.el8ev.src.rpm
m2crypto-0.35.2-5.el8ev.src.rpm
makeself-2.4.0-4.el8ev.src.rpm
novnc-1.1.0-1.el8ost.src.rpm
openstack-java-sdk-3.2.9-1.el8ev.src.rpm
ovirt-cockpit-sso-0.1.4-1.el8ev.src.rpm
ovirt-engine-4.4.1.8-0.7.el8ev.src.rpm
ovirt-engine-api-explorer-0.0.6-1.el8ev.src.rpm
ovirt-engine-dwh-4.4.1.2-1.el8ev.src.rpm
ovirt-engine-extension-aaa-jdbc-1.2.0-1.el8ev.src.rpm
ovirt-engine-extension-aaa-ldap-1.4.0-1.el8ev.src.rpm
ovirt-engine-extension-aaa-misc-1.1.0-1.el8ev.src.rpm
ovirt-engine-extension-logger-log4j-1.1.0-1.el8ev.src.rpm
ovirt-engine-extensions-api-1.0.1-1.el8ev.src.rpm
ovirt-engine-metrics-1.4.1.1-1.el8ev.src.rpm
ovirt-engine-ui-extensions-1.2.2-1.el8ev.src.rpm
ovirt-fast-forward-upgrade-1.1.6-0.el8ev.src.rpm
ovirt-log-collector-4.4.2-1.el8ev.src.rpm
ovirt-scheduler-proxy-0.1.9-1.el8ev.src.rpm
ovirt-web-ui-1.6.3-1.el8ev.src.rpm
python-aniso8601-0.82-4.el8ost.src.rpm
python-flask-1.0.2-2.el8ost.src.rpm
python-flask-restful-0.3.6-8.el8ost.src.rpm
python-netaddr-0.7.19-8.1.el8ost.src.rpm
python-notario-0.0.16-2.el8cp.src.rpm
python-ovsdbapp-0.17.1-0.20191216120142.206cf14.el8ost.src.rpm
python-pbr-5.1.2-2.el8ost.src.rpm
python-six-1.12.0-1.el8ost.src.rpm
python-websocket-client-0.54.0-1.el8ost.src.rpm
python-werkzeug-0.16.0-1.el8ost.src.rpm
rhv-log-collector-analyzer-1.0.2-1.el8ev.src.rpm
rhvm-branding-rhv-4.4.4-1.el8ev.src.rpm
rhvm-dependencies-4.4.0-1.el8ev.src.rpm
rhvm-setup-plugins-4.4.2-1.el8ev.src.rpm
snmp4j-2.4.1-1.el8ev.src.rpm
unboundid-ldapsdk-4.0.14-1.el8ev.src.rpm
vdsm-jsonrpc-java-1.5.4-1.el8ev.src.rpm
ws-commons-util-1.0.2-1.el8ev.src.rpm
xmlrpc-3.1.3-1.el8ev.src.rpm
noarch:
ansible-runner-1.4.5-1.el8ar.noarch.rpm
ansible-runner-service-1.0.2-1.el8ev.noarch.rpm
apache-commons-collections4-4.4-1.el8ev.noarch.rpm
apache-commons-collections4-javadoc-4.4-1.el8ev.noarch.rpm
apache-commons-compress-1.18-1.el8ev.noarch.rpm
apache-commons-compress-javadoc-1.18-1.el8ev.noarch.rpm
apache-commons-configuration-1.10-1.el8ev.noarch.rpm
apache-commons-jexl-2.1.1-1.el8ev.noarch.rpm
apache-commons-jexl-javadoc-2.1.1-1.el8ev.noarch.rpm
apache-commons-jxpath-1.3-29.el8ev.noarch.rpm
apache-commons-jxpath-javadoc-1.3-29.el8ev.noarch.rpm
apache-commons-vfs-2.4.1-1.el8ev.noarch.rpm
apache-commons-vfs-ant-2.4.1-1.el8ev.noarch.rpm
apache-commons-vfs-examples-2.4.1-1.el8ev.noarch.rpm
apache-commons-vfs-javadoc-2.4.1-1.el8ev.noarch.rpm
apache-sshd-2.5.1-1.el8ev.noarch.rpm
apache-sshd-javadoc-2.5.1-1.el8ev.noarch.rpm
ebay-cors-filter-1.0.1-4.el8ev.noarch.rpm
ed25519-java-0.3.0-1.el8ev.noarch.rpm
ed25519-java-javadoc-0.3.0-1.el8ev.noarch.rpm
engine-db-query-1.6.1-1.el8ev.noarch.rpm
java-client-kubevirt-0.5.0-1.el8ev.noarch.rpm
log4j12-1.2.17-22.el8ev.noarch.rpm
log4j12-javadoc-1.2.17-22.el8ev.noarch.rpm
makeself-2.4.0-4.el8ev.noarch.rpm
novnc-1.1.0-1.el8ost.noarch.rpm
openstack-java-ceilometer-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-ceilometer-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-cinder-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-cinder-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-glance-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-glance-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-heat-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-heat-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-javadoc-3.2.9-1.el8ev.noarch.rpm
openstack-java-keystone-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-keystone-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-nova-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-nova-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-quantum-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-quantum-model-3.2.9-1.el8ev.noarch.rpm
openstack-java-resteasy-connector-3.2.9-1.el8ev.noarch.rpm
openstack-java-swift-client-3.2.9-1.el8ev.noarch.rpm
openstack-java-swift-model-3.2.9-1.el8ev.noarch.rpm
ovirt-cockpit-sso-0.1.4-1.el8ev.noarch.rpm
ovirt-engine-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-api-explorer-0.0.6-1.el8ev.noarch.rpm
ovirt-engine-backend-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-dbscripts-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-dwh-4.4.1.2-1.el8ev.noarch.rpm
ovirt-engine-dwh-grafana-integration-setup-4.4.1.2-1.el8ev.noarch.rpm
ovirt-engine-dwh-setup-4.4.1.2-1.el8ev.noarch.rpm
ovirt-engine-extension-aaa-jdbc-1.2.0-1.el8ev.noarch.rpm
ovirt-engine-extension-aaa-ldap-1.4.0-1.el8ev.noarch.rpm
ovirt-engine-extension-aaa-ldap-setup-1.4.0-1.el8ev.noarch.rpm
ovirt-engine-extension-aaa-misc-1.1.0-1.el8ev.noarch.rpm
ovirt-engine-extension-logger-log4j-1.1.0-1.el8ev.noarch.rpm
ovirt-engine-extensions-api-1.0.1-1.el8ev.noarch.rpm
ovirt-engine-extensions-api-javadoc-1.0.1-1.el8ev.noarch.rpm
ovirt-engine-health-check-bundler-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-metrics-1.4.1.1-1.el8ev.noarch.rpm
ovirt-engine-restapi-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-base-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-plugin-cinderlib-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-plugin-imageio-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-common-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-setup-plugin-websocket-proxy-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-tools-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-tools-backup-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-ui-extensions-1.2.2-1.el8ev.noarch.rpm
ovirt-engine-vmconsole-proxy-helper-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-webadmin-portal-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-engine-websocket-proxy-4.4.1.8-0.7.el8ev.noarch.rpm
ovirt-fast-forward-upgrade-1.1.6-0.el8ev.noarch.rpm
ovirt-log-collector-4.4.2-1.el8ev.noarch.rpm
ovirt-scheduler-proxy-0.1.9-1.el8ev.noarch.rpm
ovirt-web-ui-1.6.3-1.el8ev.noarch.rpm
python-flask-doc-1.0.2-2.el8ost.noarch.rpm
python2-netaddr-0.7.19-8.1.el8ost.noarch.rpm
python2-pbr-5.1.2-2.el8ost.noarch.rpm
python2-six-1.12.0-1.el8ost.noarch.rpm
python3-aniso8601-0.82-4.el8ost.noarch.rpm
python3-ansible-runner-1.4.5-1.el8ar.noarch.rpm
python3-flask-1.0.2-2.el8ost.noarch.rpm
python3-flask-restful-0.3.6-8.el8ost.noarch.rpm
python3-netaddr-0.7.19-8.1.el8ost.noarch.rpm
python3-notario-0.0.16-2.el8cp.noarch.rpm
python3-ovirt-engine-lib-4.4.1.8-0.7.el8ev.noarch.rpm
python3-ovsdbapp-0.17.1-0.20191216120142.206cf14.el8ost.noarch.rpm
python3-pbr-5.1.2-2.el8ost.noarch.rpm
python3-six-1.12.0-1.el8ost.noarch.rpm
python3-websocket-client-0.54.0-1.el8ost.noarch.rpm
python3-werkzeug-0.16.0-1.el8ost.noarch.rpm
python3-werkzeug-doc-0.16.0-1.el8ost.noarch.rpm
rhv-log-collector-analyzer-1.0.2-1.el8ev.noarch.rpm
rhvm-4.4.1.8-0.7.el8ev.noarch.rpm
rhvm-branding-rhv-4.4.4-1.el8ev.noarch.rpm
rhvm-dependencies-4.4.0-1.el8ev.noarch.rpm
rhvm-setup-plugins-4.4.2-1.el8ev.noarch.rpm
snmp4j-2.4.1-1.el8ev.noarch.rpm
snmp4j-javadoc-2.4.1-1.el8ev.noarch.rpm
unboundid-ldapsdk-4.0.14-1.el8ev.noarch.rpm
unboundid-ldapsdk-javadoc-4.0.14-1.el8ev.noarch.rpm
vdsm-jsonrpc-java-1.5.4-1.el8ev.noarch.rpm
ws-commons-util-1.0.2-1.el8ev.noarch.rpm
ws-commons-util-javadoc-1.0.2-1.el8ev.noarch.rpm
xmlrpc-client-3.1.3-1.el8ev.noarch.rpm
xmlrpc-common-3.1.3-1.el8ev.noarch.rpm
xmlrpc-javadoc-3.1.3-1.el8ev.noarch.rpm
xmlrpc-server-3.1.3-1.el8ev.noarch.rpm
x86_64:
m2crypto-debugsource-0.35.2-5.el8ev.x86_64.rpm
python3-m2crypto-0.35.2-5.el8ev.x86_64.rpm
python3-m2crypto-debuginfo-0.35.2-5.el8ev.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-18635
https://access.redhat.com/security/cve/CVE-2019-8331
https://access.redhat.com/security/cve/CVE-2019-10086
https://access.redhat.com/security/cve/CVE-2019-13990
https://access.redhat.com/security/cve/CVE-2019-17195
https://access.redhat.com/security/cve/CVE-2019-19336
https://access.redhat.com/security/cve/CVE-2020-7598
https://access.redhat.com/security/cve/CVE-2020-10775
https://access.redhat.com/security/cve/CVE-2020-11022
https://access.redhat.com/security/cve/CVE-2020-11023
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.3/html-single/technical_notes
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=92Q3
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
VAR-201910-1864 | No CVE | MOXA EtherDevice Switch EDS Series Switch Has Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
MOXA EtherDevice Switch EDS series is a series of industrial switches launched by Moxa.
MOXA EtherDevice Switch EDS series switches have a denial of service vulnerability. An attacker could exploit this vulnerability to cause a denial of service.
VAR-201910-0722 | CVE-2019-17511 | D-Link DIR-412 Authentication vulnerabilities in routers |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can get the router's log file via log_get.php, which could be used to discover the intranet network structure. D-Link DIR-412 The router contains an authentication vulnerability.Information may be obtained. D-Link DIR-412 is a wireless router from Taiwan D-Link Corporation.
D-Link DIR-412 A1-1.14WW version has an authorization issue vulnerability. This vulnerability originates from the failure of some web pages to require authentication
VAR-201910-0647 | CVE-2019-12941 | AutoPi Wi-Fi/NB and 4G/LTE Vulnerability related to information leak from cache in device |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID. AutoPi Wi-Fi/NB and 4G/LTE The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AutoPi.io AutoPi Wi-Fi / NB and AutoPi 4G / LTE are encryption devices from Denmark's AutoPi.io.
AutoPi.io AutoPi Wi-Fi / NB and AutoPi 4G / LTE versions prior to 2019-10-15 have security vulnerabilities
VAR-201910-0270 | CVE-2019-3767 | Dell ImageAssist Vulnerable to information disclosure |
CVSS V2: 1.9 CVSS V3: 8.2 Severity: HIGH |
Dell ImageAssist versions prior to 8.7.15 contain an information disclosure vulnerability. Dell ImageAssist stores some sensitive encrypted information in the images it creates. A privileged user of a system running an operating system that was deployed with Dell ImageAssist could potentially retrieve this sensitive information to then compromise the system and related systems. Dell ImageAssist is a tool used by Dell to capture user's Windows installation configuration. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
VAR-201910-0685 | CVE-2019-17532 | Belkin Wemo Switch 28B Input Validation Error Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote attackers to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because database corruption occurs. Belkin Wemo Switch 28B The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201910-0718 | CVE-2019-17507 | D-Link DIR-816 A1 Vulnerability related to input validation on devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on D-Link DIR-816 A1 1.06 devices. An attacker could access management pages of the router via a client that ignores the 'top.location.href = "/dir_login.asp"' line in a .asp file. This provides access to d_status.asp, version.asp, d_dhcptbl.asp, and d_acl.asp. D-Link DIR-816 A1 The device contains an input validation vulnerability.Information may be obtained. D-Link DIR-816 is a wireless router from Taiwan D-Link.
There are security vulnerabilities in D-Link DIR-816 A1 version 1.06
VAR-201910-0716 | CVE-2019-17505 | D-Link DAP-1320 Authentication vulnerabilities in routers |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DAP-1320 A2-V1.21 routers have some web interfaces without authentication requirements, as demonstrated by uplink_info.xml. An attacker can remotely obtain a user's Wi-Fi SSID and password, which could be used to connect to Wi-Fi or perform a dictionary attack. D-Link DAP-1320 The router contains an authentication vulnerability.Information may be obtained. D-Link DAP-1320 is a wireless signal extender from Taiwan D-Link.
There is a security vulnerability in D-Link DAP-1320 A2-V1.21
VAR-201910-0719 | CVE-2019-17508 | D-Link DIR-859 and DIR-850 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
On D-Link DIR-859 A3-1.06 and DIR-850 A1.13 devices, /etc/services/DEVICE.TIME.php allows command injection via the $SERVER variable. D-Link DIR-859 and DIR-850 The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-859 is a wireless AC1750 high-power Wi-Fi Gigabit router. D-Link DIR-850L is a wireless AC1200 dual-band Gigabit cloud router. An attacker could use this vulnerability to implement remote code execution through the $ SERVER variable. Both D-Link DIR-859 and D-Link DIR-850 are wireless routers produced by Taiwan D-Link Company. There is a security vulnerability in the /etc/services/DEVICE.TIME.php file in D-Link DIR-859 version A3-1.06 and DIR-850 version A1.13
VAR-201910-0720 | CVE-2019-17509 | D-Link DIR-846 In device firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary OS commands as root by leveraging admin access and sending a /HNAP1/ request for SetMasterWLanSettings with shell metacharacters to /squashfs-root/www/HNAP1/control/SetMasterWLanSettings.php. D-Link DIR-846 Device firmware includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link (Youxun) DIR-846 is a 6-antenna 1200M full Gigabit dual-band MU-MIMO wireless router.
D-Link DIR-846 with firmware version 100A35 has an arbitrary OS command execution vulnerability
VAR-201910-0721 | CVE-2019-17510 | D-Link DIR-846 In device firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary OS commands as root by leveraging admin access and sending a /HNAP1/ request for SetWizardConfig with shell metacharacters to /squashfs-root/www/HNAP1/control/SetWizardConfig.php. D-Link DIR-846 Device firmware includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-846 is a 6-antenna 1200M full Gigabit dual-band MU-MIMO wireless router.
D-Link DIR-846 with firmware version 100A35 has an arbitrary OS command execution vulnerability
VAR-201910-0684 | CVE-2019-17499 | Compal CH7465LG In the device OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The setter.xml component of the Common Gateway Interface on Compal CH7465LG 6.12.18.25-2p4 devices does not properly validate ping command arguments, which allows remote authenticated users to execute OS commands as root via shell metacharacters in the Target_IP parameter. Compal CH7465LG The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Compal CH7465LG is a wireless router from Compal Computer Industry (Compal) of Taiwan, China. A remote attacker could use the shell metacharacter in the 'Target_IP' parameter to exploit this vulnerability to execute operating system commands