An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:4340 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:4590 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-3971 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2226965 | vendor advisory issue tracking |