An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
                
            References
                    | Link | Resource | 
|---|---|
| https://access.redhat.com/errata/RHSA-2023:4340 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:4590 | Vendor Advisory | 
| https://access.redhat.com/security/cve/CVE-2023-3971 | Vendor Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2226965 | Issue Tracking Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:4340 | Vendor Advisory | 
| https://access.redhat.com/errata/RHSA-2023:4590 | Vendor Advisory | 
| https://access.redhat.com/security/cve/CVE-2023-3971 | Vendor Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2226965 | Issue Tracking Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 08:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/errata/RHSA-2023:4340 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:4590 - Vendor Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2023-3971 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2226965 - Issue Tracking, Vendor Advisory | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.3 | 
10 Oct 2023, 19:11
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-79 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.4 | 
| First Time | Redhat Redhat ansible Automation Platform Redhat enterprise Linux Redhat ansible Inside Redhat ansible Developer Redhat ansible Automation Controller | |
| CPE | cpe:2.3:a:redhat:ansible_automation_controller:4.4:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_automation_controller:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_inside:1.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_automation_platform:2.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_automation_platform:2.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:ansible_developer:1.0:*:*:*:*:*:*:* | |
| References | (MISC) https://access.redhat.com/security/cve/CVE-2023-3971 - Vendor Advisory | |
| References | (MISC) https://access.redhat.com/errata/RHSA-2023:4340 - Vendor Advisory | |
| References | (MISC) https://access.redhat.com/errata/RHSA-2023:4590 - Vendor Advisory | |
| References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2226965 - Issue Tracking, Vendor Advisory | 
04 Oct 2023, 15:53
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-10-04 15:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-3971
Mitre link : CVE-2023-3971
CVE.ORG link : CVE-2023-3971
JSON object : View
Products Affected
                redhat
- ansible_automation_controller
- ansible_automation_platform
- ansible_inside
- enterprise_linux
- ansible_developer
