Rapid7 Vulnerability & Exploit Database

Alma Linux: CVE-2020-25715: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (ALSA-2020-4847)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Alma Linux: CVE-2020-25715: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (ALSA-2020-4847)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
05/28/2021
Created
05/05/2022
Added
05/04/2022
Modified
05/04/2022

Description

A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.

Solution(s)

  • alma-upgrade-apache-commons-collections
  • alma-upgrade-apache-commons-lang
  • alma-upgrade-apache-commons-net
  • alma-upgrade-bea-stax-api
  • alma-upgrade-glassfish-fastinfoset
  • alma-upgrade-glassfish-jaxb-api
  • alma-upgrade-glassfish-jaxb-core
  • alma-upgrade-glassfish-jaxb-runtime
  • alma-upgrade-glassfish-jaxb-txw2
  • alma-upgrade-jackson-annotations
  • alma-upgrade-jackson-core
  • alma-upgrade-jackson-databind
  • alma-upgrade-jackson-jaxrs-json-provider
  • alma-upgrade-jackson-jaxrs-providers
  • alma-upgrade-jackson-module-jaxb-annotations
  • alma-upgrade-jakarta-commons-httpclient
  • alma-upgrade-javassist
  • alma-upgrade-javassist-javadoc
  • alma-upgrade-pki-servlet-4.0-api
  • alma-upgrade-pki-servlet-engine
  • alma-upgrade-python-nss-doc
  • alma-upgrade-python3-nss
  • alma-upgrade-relaxngDatatype
  • alma-upgrade-resteasy
  • alma-upgrade-slf4j
  • alma-upgrade-slf4j-jdk14
  • alma-upgrade-stax-ex
  • alma-upgrade-velocity
  • alma-upgrade-xalan-j2
  • alma-upgrade-xerces-j2
  • alma-upgrade-xml-commons-apis
  • alma-upgrade-xml-commons-resolver
  • alma-upgrade-xmlstreambuffer
  • alma-upgrade-xsom

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;