CVE-2017-18635

An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
References
Link Resource
https://access.redhat.com/errata/RHSA-2020:0754 Third Party Advisory
https://bugs.launchpad.net/horizon/+bug/1656435 Issue Tracking Third Party Advisory
https://github.com/ShielderSec/cve-2017-18635 Third Party Advisory
https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534 Patch Third Party Advisory
https://github.com/novnc/noVNC/issues/748 Patch Third Party Advisory
https://github.com/novnc/noVNC/releases/tag/v0.6.2 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4522-1/ Third Party Advisory
https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ Exploit Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0754 Third Party Advisory
https://bugs.launchpad.net/horizon/+bug/1656435 Issue Tracking Third Party Advisory
https://github.com/ShielderSec/cve-2017-18635 Third Party Advisory
https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534 Patch Third Party Advisory
https://github.com/novnc/noVNC/issues/748 Patch Third Party Advisory
https://github.com/novnc/noVNC/releases/tag/v0.6.2 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4522-1/ Third Party Advisory
https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:novnc:novnc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*

Configuration 4 (hide)

cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

History

21 Nov 2024, 03:20

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2020:0754 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0754 - Third Party Advisory
References () https://bugs.launchpad.net/horizon/+bug/1656435 - Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/horizon/+bug/1656435 - Issue Tracking, Third Party Advisory
References () https://github.com/ShielderSec/cve-2017-18635 - Third Party Advisory () https://github.com/ShielderSec/cve-2017-18635 - Third Party Advisory
References () https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534 - Patch, Third Party Advisory () https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534 - Patch, Third Party Advisory
References () https://github.com/novnc/noVNC/issues/748 - Patch, Third Party Advisory () https://github.com/novnc/noVNC/issues/748 - Patch, Third Party Advisory
References () https://github.com/novnc/noVNC/releases/tag/v0.6.2 - Release Notes, Third Party Advisory () https://github.com/novnc/noVNC/releases/tag/v0.6.2 - Release Notes, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/4522-1/ - Third Party Advisory () https://usn.ubuntu.com/4522-1/ - Third Party Advisory
References () https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ - Exploit, Third Party Advisory () https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/ - Exploit, Third Party Advisory

Information

Published : 2019-09-25 23:15

Updated : 2024-11-21 03:20


NVD link : CVE-2017-18635

Mitre link : CVE-2017-18635

CVE.ORG link : CVE-2017-18635


JSON object : View

Products Affected

redhat

  • openstack

debian

  • debian_linux

novnc

  • novnc

canonical

  • ubuntu_linux
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')