Bug 1601614 (CVE-2018-14040)
Summary: | CVE-2018-14040 bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abergmann, abokovoy, aboyko, alazarot, amasferr, anstephe, apevec, asoldano, axilleas, bbaranow, bbuckingham, bcourt, bkearney, bmaxwell, bmcclain, boliveir, brian.stansberry, cdewolf, chazlett, cheimes, chrisw, cpelland, dajohnso, darran.lofthouse, dbecker, dblechte, dfediuck, dkreling, dmetzger, dosoudil, eedri, etirelli, fjuma, frenaud, gblomqui, gmccullo, gshereme, gtanzill, hhudgeon, ibek, iweiss, jfrey, jhardy, jjoyce, jochrist, jprause, jschluet, jwon, kdixon, krathod, kverlaen, lgao, lhh, lpeer, markmc, mburns, meissner, mgoldboi, michal.skrivanek, mkosek, mkudlej, mmccune, mosmerov, mrunge, msochure, msvehla, nwallace, obarenbo, ohadlevy, pdrozd, pjindal, pmackay, pskopek, rbryant, rchan, rcritten, rdopiera, rhcs-maint, rhos-maint, rjerrido, roliveri, rrajasek, rstancel, rsynek, rzhang, sbonazzo, sclewis, sdaley, sherold, simaishi, slinaber, smaestri, sthorger, tdecacqu, tjochec, tlestach, tom.jenkinson, tscherf, twoerner |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | bootstrap 4.1.2, bootstrap 3.4.1 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-09-29 21:57:14 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1639100, 1648735, 1648736, 1648737, 1657411, 1657412, 1657413, 1657414, 1657415, 1811978, 1811979, 1811980, 1811981 | ||
Bug Blocks: | 1632066 |
Description
Laura Pardo
2018-07-16 22:41:35 UTC
bootstrap 3.3.7 is affected by this flaw. For OpenStack releases 12 through 14, an affected version of bootstrap is being distributed. Marking as low because the vulnerable functionality is not used by OpenStack. Statement: Red Hat Satellite 6.2 and newer versions don't use the bootstrap library, hence are not affected by this flaw. Red Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don't use the vulnerable component at all. Red Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3936 https://access.redhat.com/errata/RHSA-2020:3936 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14040 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4670 https://access.redhat.com/errata/RHSA-2020:4670 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4847 https://access.redhat.com/errata/RHSA-2020:4847 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Via RHSA-2023:0553 https://access.redhat.com/errata/RHSA-2023:0553 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Via RHSA-2023:0552 https://access.redhat.com/errata/RHSA-2023:0552 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 Via RHSA-2023:0554 https://access.redhat.com/errata/RHSA-2023:0554 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2023:0556 https://access.redhat.com/errata/RHSA-2023:0556 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 7 Via RHSA-2023:1043 https://access.redhat.com/errata/RHSA-2023:1043 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 8 Via RHSA-2023:1044 https://access.redhat.com/errata/RHSA-2023:1044 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 9 Via RHSA-2023:1045 https://access.redhat.com/errata/RHSA-2023:1045 This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2023:1047 https://access.redhat.com/errata/RHSA-2023:1047 This issue has been addressed in the following products: Red Hat Single Sign-On Via RHSA-2023:1049 https://access.redhat.com/errata/RHSA-2023:1049 |