{
  "threat_severity" : "Moderate",
  "public_date" : "2023-03-12T00:00:00Z",
  "bugzilla" : {
    "description" : "Foreman: Stored cross-site scripting in host tab",
    "id" : "2159104",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2159104"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-79",
  "details" : [ "A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.", "A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials." ],
  "statement" : "This issue does not affect Satellite versions 6.12 and below.",
  "acknowledgement" : "Red Hat would like to thank Dinko Dimitrov (Onsec.io) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.13 for RHEL 8",
    "release_date" : "2023-05-31T00:00:00Z",
    "advisory" : "RHSA-2023:3387",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.13::el8",
    "package" : "foreman-0:3.5.1.17-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.14 for RHEL 8",
    "release_date" : "2023-11-08T00:00:00Z",
    "advisory" : "RHSA-2023:6818",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.14::el8",
    "package" : "foreman-0:3.7.0.9-1.el8sat"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-0119\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-0119\nhttps://projects.theforeman.org/issues/35977" ],
  "name" : "CVE-2023-0119",
  "csaw" : false
}