Vulnerabilities > CVE-2019-11358

047910
CVSS 6.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
LOW
Integrity impact
LOW
Availability impact
NONE

Summary

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

Vulnerable Configurations

Part Description Count
Application
Jquery
287
Application
Drupal
115
Application
Backdropcms
15
Application
Opensuse
1
Application
Netapp
7
Application
Redhat
2
Application
Oracle
351
Application
Joomla
199
OS
Debian
3
OS
Fedoraproject
3
OS
Opensuse
1
OS
Juniper
1

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-7EAF0BBE7C.NASL
    description- https://www.drupal.org/project/drupal/releases/8.6.15 - https://www.drupal.org/SA-CORE-2019-005 (CVE-2019-10909 / CVE-2019-10910 / CVE-2019-10911) - https://www.drupal.org/SA-CORE-2019-006 (CVE-2019-11358) - https://www.drupal.org/project/drupal/releases/8.6.14 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124686
    published2019-05-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124686
    titleFedora 29 : drupal8 (2019-7eaf0bbe7c)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-2118.NASL
    descriptionIt was discovered that the jQuery version embedded in OTRS, a ticket request system, was prone to a cross site scripting vulnerability in jQuery.extend(). For Debian 8
    last seen2020-03-17
    modified2020-02-25
    plugin id133967
    published2020-02-25
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133967
    titleDebian DLA-2118-1 : otrs2 security update
  • NASL familyMisc.
    NASL idORACLE_WEBLOGIC_SERVER_CPU_OCT_2019.NASL
    descriptionThe version of Oracle WebLogic Server installed on the remote host is affected by multiple vulnerabilities: - An unspecified vulnerability in the jquery component of the Web Services of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to gain unauthorized update, insert, or delete access to some of Oracle WebLogic Server accessible data. (CVE-2015-9251) - An unspecified vulnerability in the Web Services component of Oracle Weblogic Server. An unauthenticated, remote attacker unauthorized can exploit this to gain read access to some of Oracle WebLogic Server accessible data. (CVE-2019-2887) - An unspecified vulnerability in the Web Services component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to gain unauthorized read access to some of Oracle WebLogic Server accessible data. (CVE-2019-2888) - An unspecified vulnerability in the Web Services component of Oracle Weblogic Server. An authenticated, high priviledge remote attacker can exploit this to compromise Oracle WebLogic Server. (CVE-2019-2890) - An unspecified vulnerability in the console component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to compromise Oracle WebLogic Server. (CVE-2019-2891) - An unspecified vulnerability in the SOAP with Attachments API for Java component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to gain unauthorized update, insert, or delete access to some of Oracle Web Services accessible data as well as unauthorized read access to a subset of Oracle Web Services accessible data. (CVE-2019-2907) - An unspecified vulnerability in the ADF Faces jQuery component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to compromise Oracle JDeveloper and ADF resulting in an unauthorized update, insert, or delete access to some of OracleJDeveloper & ADF accessible data as well as unauthorized read access to a subset of Oracle JDeveloper & ADF accessible data. (CVE-2019-11358) - An unspecified vulnerability in the Web Container jQuery component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to compromise Oracle Service Bus resulting in an unauthorized update, insert, or delete access to some of Service Bus data as well as unauthorized read access to a subset of Oracle Service Bus accessible data. (CVE-2019-11358) - An unspecified vulnerability in the console jQuery component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to compromise Oracle WebLogic Server resulting in an unauthorized update, insert, or delete access to some of Oracle WebLogic Server data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. (CVE-2019-11358) - An unspecified vulnerability in the Web Container Faces jQuery component of Oracle Weblogic Server. An unauthenticated, remote attacker can exploit this to compromise Oracle Service Bus resulting in an unauthorized update, insert, or delete access to some of Oracle WebLogic Server data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. (CVE-2019-17091)
    last seen2020-06-01
    modified2020-06-02
    plugin id130012
    published2019-10-17
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130012
    titleOracle WebLogic Server Multiple Vulnerabilities (Oct 2019 CPU)
  • NASL familyCGI abuses
    NASL idORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2019.NASL
    descriptionAccording to its self-reported version number, the Oracle Primavera Unifier installation running on the remote web server is 16.1.x or 16.2.x prior to 16.2.15.10, or 17.7.x through 17.12.x prior to 17.12.11.1, or 18.8.x prior to 18.8.13.0. It is, therefore, affected by multiple vulnerabilities: - An unspecified flaw exists in how
    last seen2020-06-01
    modified2020-06-02
    plugin id130070
    published2019-10-21
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130070
    titleOracle Primavera Unifier Multiple Vulnerabilities (Oct 2019 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-1325.NASL
    descriptionThe remote Redhat Enterprise Linux 8 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2020:1325 advisory. - js-jquery: prototype pollution in object
    last seen2020-04-23
    modified2020-04-07
    plugin id135256
    published2020-04-07
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135256
    titleRHEL 8 : python-XStatic-jQuery (RHSA-2020:1325)
  • NASL familyMisc.
    NASL idORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2019_CPU.NASL
    descriptionThe version of Oracle Enterprise Manager Ops Center installed on the remote host is affected by multiple vulnerabilities in Enterprise Manager Base Platform component: - An unspecified vulnerability in the Networking (cURL) component of Oracle Enterprise Manager Ops Center. An easy to exploit vulnerability could allow an unauthenticated attacker with network access via HTTPS to compromise Enterprise Manager Ops Center. A successful attack of this vulnerability can result in takeover of Enterprise Manager Ops Center. (CVE-2019-5443) - An unspecified vulnerability in the Networking (jQuery) component of Oracle Enterprise Manager Ops Center. A difficult to exploit vulnerability could allow a low privileged attacker with logon to the infrastructure where Enterprise Manager Ops Center executes to compromise Enterprise Manager Ops Center. A successful attack of this vulnerability can result in unauthorized access of Enterprise Manager Ops Center data. (CVE-2019-11358) - An unspecified vulnerability in the OS Provisioning (Apache HTTP Server) component of Oracle Enterprise Manager Ops Center. An easily exploitable vulnerability could allow an unauthenticated attacker with network access via multiple protocols to compromise Enterprise Manager Ops Center. A successful attack of this vulnerability can result in unauthorized access of Enterprise Manager Ops Center data. (CVE-2019-9517)
    last seen2020-05-08
    modified2020-01-17
    plugin id133057
    published2020-01-17
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133057
    titleOracle Enterprise Manager Ops Center (Oct 2019 CPU)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-2A0CE0C58C.NASL
    description- https://www.drupal.org/project/drupal/releases/7.66 - https://www.drupal.org/SA-CORE-2019-006 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124699
    published2019-05-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124699
    titleFedora 30 : drupal7 (2019-2a0ce0c58c)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_FFC73E8787F011E9AD56FCAA147E860E.NASL
    descriptionDjango security releases issued : The clickable
    last seen2020-06-01
    modified2020-06-02
    plugin id125750
    published2019-06-07
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125750
    titleFreeBSD : Django -- AdminURLFieldWidget XSS (ffc73e87-87f0-11e9-ad56-fcaa147e860e)
  • NASL familyMisc.
    NASL idORACLE_OATS_CPU_JAN_2020.NASL
    descriptionThe version of Oracle Application Testing Suite installed on the remote host is affected by multiple vulnerabilities : - Vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager (component: Oracle Flow Builder (Jython)). Supported versions that are affected are 12.5.0.3, 13.1.0.1, 13.2.0.1 and 13.3.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Testing Suite. Successful attacks of this vulnerability can result in takeover of Oracle Application Testing Suite. (CVE-2016-4000) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Oracle Flow Builder (Jython). An unauthenticated, remote attacker with network access via HTTP to compromise Oracle Application Testing Suite. (CVE-2016-4000) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Load Testing for Web Apps (Apache POI). An unauthenticated, remote attacker with network access via HTTP to compromise Oracle Application Testing Suite and cause the process to hang or frequently repeatable crash (complete DOS). (CVE-2017-12626) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Oracle Flow Builder (Apache POI). An unauthenticated, remote attacker with network access via HTTP to compromise Oracle Application Testing Suite and cause the process to hang or frequently repeatable crash (complete DOS). (CVE-2017-12626) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Load Testing for Web Apps (AntiSamy). An unauthenticated, remote attacker with network access via HTTP who is able to obtain human interaction can impact additional products and result in an unauthorized update, insert, or delete access to some accessible data as well as unauthorized read access to a subset of accessible data. (CVE-2017-14735) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Oracle Flow Builder (Antisamy). An unauthenticated, remote attacker with network access via HTTP who is able to obtain human interaction can impact additional products and result in an unauthorized update, insert, or delete access to some accessible data as well as unauthorized read access to a subset of accessible data. (CVE-2017-14735) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Load Testing for Web Apps (Application Development Framework). An unauthenticated, remote attacker with network access via HTTP can result in takeover of Oracle Application Testing Suite. (CVE-2019-2904) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Oracle Flow Builder (jQuery). An unauthenticated, remote attacker with network access via HTTP who is able to obtain human interaction can impact additional products and result in an unauthorized update, insert, or delete access to some accessible data as well as unauthorized read access to a subset of accessible data. (CVE-2019-11358) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Load Testing for Web Apps (Apache POI). An authenticated, low priviledged remote attacker with network access to the infrastructure can result in unauthorized access to critical data or complete access to all Oracle Application Testing Suite accessible data. (CVE-2019-12415) - An unspecified vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager subcomponent Oracle Flow Builder. An unauthenticated remote attacker with network access via HTTP can result in unauthorized access to critical data or complete access to all Oracle Application Testing Suite accessible data. (CVE-2020-2673)
    last seen2020-05-08
    modified2020-01-27
    plugin id133260
    published2020-01-27
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133260
    titleOracle Application Testing Suite Multiple Vulnerabilities (Jan 2020 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-3024.NASL
    descriptionAn update for ovirt-web-ui is now available for Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The ovirt-web-ui package provides the web interface for Red Hat Virtualization. Security Fix(es) : * nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties (CVE-2019-10744) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: prototype pollution in object
    last seen2020-06-01
    modified2020-06-02
    plugin id129862
    published2019-10-15
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129862
    titleRHEL 7 : Virtualization Manager (RHSA-2019:3024)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-3023.NASL
    descriptionAn update for ovirt-engine-ui-extensions is now available for Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The ovirt-engine-ui-extensions package contains UI plugins that provide various extensions to the oVirt administration UI. Security Fix(es) : * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: prototype pollution in object
    last seen2020-06-01
    modified2020-06-02
    plugin id129861
    published2019-10-15
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129861
    titleRHEL 7 : Virtualization Manager (RHSA-2019:3023)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-F563E66380.NASL
    description- https://www.drupal.org/project/drupal/releases/7.66 - https://www.drupal.org/SA-CORE-2019-006 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124703
    published2019-05-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124703
    titleFedora 28 : drupal7 (2019-f563e66380)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4434.NASL
    descriptionA cross-site scripting vulnerability has been found in Drupal, a fully-featured content management framework. For additional information, please refer to the upstream advisory at https://www.drupal.org/sa-core-2019-006 .
    last seen2020-06-01
    modified2020-06-02
    plugin id124205
    published2019-04-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124205
    titleDebian DSA-4434-1 : drupal7 - security update
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-EBA8E44EE6.NASL
    description- https://www.drupal.org/project/drupal/releases/8.6.15 - https://www.drupal.org/SA-CORE-2019-005 (CVE-2019-10909 / CVE-2019-10910 / CVE-2019-10911) - https://www.drupal.org/SA-CORE-2019-006 (CVE-2019-11358) - https://www.drupal.org/project/drupal/releases/8.6.14 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124688
    published2019-05-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124688
    titleFedora 30 : drupal8 (2019-eba8e44ee6)
  • NASL familyWindows
    NASL idORACLE_WEBCENTER_SITES_APR_2020_CPU.NASL
    descriptionOracle WebCenter Sites component of Oracle Fusion Middleware is vulnerable to multiple vulnerabilities. - Component: Advanced UI (jQuery). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as unauthorized read access to a subset of Oracle WebCenter Sites accessible data (CVE-2019-11358). - Component: Sites (jackson-databind). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in takeover of Oracle WebCenter Sites (CVE-2019-16943). - Component: Advanced UI. The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data (CVE-2020-2739 ).
    last seen2020-05-08
    modified2020-04-16
    plugin id135676
    published2020-04-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135676
    titleOracle WebCenter Sites Multiple Vulnerabilities (April 2020 CPU)
  • NASL familyCGI abuses
    NASL idORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2020.NASL
    descriptionAccording to its self-reported version number, the Oracle Primavera Gateway installation running on the remote web server is 15.x prior to 15.2.18, 16.x prior to 16.2.11, 17.x prior to 17.12.6, or 18.x prior to 18.8.8.1. It is, therefore, affected by multiple vulnerabilities, including the following: - Two Polymorphic Typing issues present in FasterXML jackson-databind related to com.zaxxer.hikari.HikariDataSource which can be exploited by remote, unauthenticated attackers. (CVE-2019-16335, CVE-2019-14540) - A man-in-the-middle vulnerability caused by the getCN function in Apache Axis not properly verifying that the server hostname matches a domain name in the subject
    last seen2020-05-08
    modified2020-01-15
    plugin id132936
    published2020-01-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132936
    titleOracle Primavera Gateway Multiple Vulnerabilities (Jan 2020 CPU)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1839.NASL
    descriptionThis update for python-Django fixes the following issues : Security issues fixed : 	 - CVE-2019-11358: Fixed prototype pollution. - CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468) - CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945). - CVE-2019-14232: Fixed denial-of-service possibility in ``django.utils.text.Truncator`` (bsc#1142880). - CVE-2019-14233: Fixed denial-of-service possibility in ``strip_tags()`` (bsc#1142882). - CVE-2019-14234: Fixed SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField`` (bsc#1142883). - CVE-2019-14235: Fixed potential memory exhaustion in ``django.utils.encoding.uri_to_iri()`` (bsc#1142885). Non-security issues fixed : - Fixed a migration crash on PostgreSQL when adding a check constraint with a contains lookup on DateRangeField or DateTimeRangeField, if the right hand side of an expression is the same type.
    last seen2020-06-01
    modified2020-06-02
    plugin id127742
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127742
    titleopenSUSE Security Update : python-Django (openSUSE-2019-1839)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-1A3EDD7E8A.NASL
    description- https://www.drupal.org/project/drupal/releases/8.6.15 - https://www.drupal.org/SA-CORE-2019-005 (CVE-2019-10909 / CVE-2019-10910 / CVE-2019-10911) - https://www.drupal.org/SA-CORE-2019-006 (CVE-2019-11358) - https://www.drupal.org/project/drupal/releases/8.6.14 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124685
    published2019-05-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124685
    titleFedora 28 : drupal8 (2019-1a3edd7e8a)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1797.NASL
    descriptionSeveral security vulnerabilities have been discovered in drupal7, a PHP website platform. The vulnerabilities affect the embedded versions of the jQuery JavaScript library and the Typo3 Phar Stream Wrapper library. CVE-2019-11358 It was discovered that the jQuery version embedded in Drupal was prone to a cross site scripting vulnerability in jQuery.extend(). For additional information, please refer to the upstream advisory at https://www.drupal.org/sa-core-2019-006. CVE-2019-11831 It was discovered that incomplete validation in a Phar processing library embedded in Drupal, a fully-featured content management framework, could result in information disclosure. For additional information, please refer to the upstream advisory at https://www.drupal.org/sa-core-2019-007. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id125298
    published2019-05-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125298
    titleDebian DLA-1797-1 : drupal7 security update
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-A06DFFAB1C.NASL
    description- https://www.drupal.org/project/drupal/releases/7.66 - https://www.drupal.org/SA-CORE-2019-006 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124700
    published2019-05-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124700
    titleFedora 29 : drupal7 (2019-a06dffab1c)
  • NASL familyCGI abuses
    NASL idJQUERY_3_4_0.NASL
    descriptionThe version of JQuery library hosted on the remote web server is prior to 3.4.0. It is, therefore, affected by an object pollution vulnerability in jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
    last seen2020-06-01
    modified2020-06-02
    plugin id124719
    published2019-05-10
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124719
    titleJQuery < 3.4.0 Object Prototype Pollution Vulnerability
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_3C5A4FE09EBB11E99169FCAA147E860E.NASL
    descriptionMediaWiki reports : Security fixes : T197279, CVE-2019-12468: Directly POSTing to Special:ChangeEmail would allow for bypassing reauthentication, allowing for potential account takeover. T204729, CVE-2019-12473: Passing invalid titles to the API could cause a DoS by querying the entire `watchlist` table. T207603, CVE-2019-12471: Loading user JavaScript from a non-existent account allows anyone to create the account, and XSS the users
    last seen2020-06-01
    modified2020-06-02
    plugin id126485
    published2019-07-05
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126485
    titleFreeBSD : mediawiki -- multiple vulnerabilities (3c5a4fe0-9ebb-11e9-9169-fcaa147e860e)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4460.NASL
    descriptionMultiple security vulnerabilities have been discovered in MediaWiki, a website engine for collaborative work, which may result in authentication bypass, denial of service, cross-site scripting, information disclosure and bypass of anti-spam measures.
    last seen2020-06-01
    modified2020-06-02
    plugin id125858
    published2019-06-13
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125858
    titleDebian DSA-4460-1 : mediawiki - security update

Redhat

advisories
  • rhsa
    idRHBA-2019:1570
  • rhsa
    idRHSA-2019:1456
  • rhsa
    idRHSA-2019:2587
  • rhsa
    idRHSA-2019:3023
  • rhsa
    idRHSA-2019:3024
rpms
  • ovirt-engine-api-explorer-0:0.0.5-1.el7ev
  • atomic-enterprise-service-catalog-1:3.11.170-1.git.1.91db82e.el7
  • atomic-enterprise-service-catalog-svcat-1:3.11.170-1.git.1.91db82e.el7
  • atomic-openshift-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-clients-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-clients-redistributable-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-cluster-autoscaler-0:3.11.170-1.git.1.0a0df6a.el7
  • atomic-openshift-descheduler-0:3.11.170-1.git.1.9ad83f2.el7
  • atomic-openshift-docker-excluder-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-dockerregistry-0:3.11.170-1.git.1.55fab05.el7
  • atomic-openshift-excluder-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-hyperkube-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-hypershift-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-master-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-metrics-server-0:3.11.170-1.git.1.357f177.el7
  • atomic-openshift-node-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-node-problem-detector-0:3.11.170-1.git.1.b1f90a6.el7
  • atomic-openshift-pod-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-sdn-ovs-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-service-idler-0:3.11.170-1.git.1.8328979.el7
  • atomic-openshift-template-service-broker-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-tests-0:3.11.170-1.git.0.00cac56.el7
  • atomic-openshift-web-console-0:3.11.170-1.git.1.3d64e8b.el7
  • cri-o-0:1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7
  • cri-o-debuginfo-0:1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7
  • golang-github-openshift-oauth-proxy-0:3.11.170-1.git.1.b49be83.el7
  • jenkins-0:2.204.2.1580891656-1.el7
  • jenkins-2-plugins-0:3.11.1579107288-1.el7
  • openshift-ansible-0:3.11.170-2.git.5.8802564.el7
  • openshift-ansible-docs-0:3.11.170-2.git.5.8802564.el7
  • openshift-ansible-playbooks-0:3.11.170-2.git.5.8802564.el7
  • openshift-ansible-roles-0:3.11.170-2.git.5.8802564.el7
  • openshift-ansible-test-0:3.11.170-2.git.5.8802564.el7
  • openshift-enterprise-autoheal-0:3.11.170-1.git.1.dfe6c52.el7
  • openshift-enterprise-cluster-capacity-0:3.11.170-1.git.1.661684b.el7
  • openshift-kuryr-cni-0:3.11.170-1.git.1.7265da1.el7
  • openshift-kuryr-common-0:3.11.170-1.git.1.7265da1.el7
  • openshift-kuryr-controller-0:3.11.170-1.git.1.7265da1.el7
  • prometheus-0:3.11.170-1.git.1.227bc98.el7
  • prometheus-alertmanager-0:3.11.170-1.git.1.61d7960.el7
  • prometheus-node-exporter-0:3.11.170-1.git.1.51473b7.el7
  • python2-kuryr-kubernetes-0:3.11.170-1.git.1.7265da1.el7
  • ansible-tower-0:3.5.2-1.el7at
  • ansible-tower-server-0:3.5.2-1.el7at
  • ansible-tower-setup-0:3.5.2-1.el7at
  • ansible-tower-ui-0:3.5.2-1.el7at
  • ansible-tower-venv-ansible-0:3.5.2-1.el7at
  • ansible-tower-venv-tower-0:3.5.2-1.el7at
  • cfme-0:5.10.9.1-1.el7cf
  • cfme-amazon-smartstate-0:5.10.9.1-1.el7cf
  • cfme-appliance-0:5.10.9.1-1.el7cf
  • cfme-appliance-common-0:5.10.9.1-1.el7cf
  • cfme-appliance-debuginfo-0:5.10.9.1-1.el7cf
  • cfme-appliance-tools-0:5.10.9.1-1.el7cf
  • cfme-debuginfo-0:5.10.9.1-1.el7cf
  • cfme-gemset-0:5.10.9.1-1.el7cf
  • cfme-gemset-debuginfo-0:5.10.9.1-1.el7cf
  • ovirt-ansible-hosted-engine-setup-0:1.0.23-1.el7ev
  • ovirt-ansible-roles-0:1.1.7-1.el7ev
  • ovirt-ansible-vm-infra-0:1.1.19-1.el7ev
  • v2v-conversion-host-ansible-0:1.14.2-1.el7ev
  • v2v-conversion-host-wrapper-0:1.14.2-1.el7ev
  • ovirt-engine-ui-extensions-0:1.0.10-1.el7ev
  • ovirt-web-ui-0:1.6.0-1.el7ev
  • python3-XStatic-jQuery-0:3.4.1.0-1.el8ost

References