A flaw was found in the Red Hat Advanced Cluster Security (RHACS) portal. When rendering a table view in the portal, for example, on any of the /main/configmanagement/* endpoints, the front-end generates a DOM table-element (id="pdf-table"). This information is then populated with unsanitized data using innerHTML. An attacker with some control over the data rendered can trigger a cross-site scripting (XSS) vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 27 Jan 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in the Red Hat Advanced Cluster Security (RHACS) portal. When rendering a table view in the portal, for example, on any of the /main/configmanagement/* endpoints, the front-end generates a DOM table-element (id="pdf-table"). This information is then populated with unsanitized data using innerHTML. An attacker with some control over the data rendered can trigger a cross-site scripting (XSS) vulnerability. |
Title | RHACS: Cross-site scripting in portal | Rhacs: cross-site scripting in portal |
First Time appeared |
Redhat
Redhat advanced Cluster Security |
|
CPEs | cpe:/a:redhat:advanced_cluster_security:3 | |
Vendors & Products |
Redhat
Redhat advanced Cluster Security |
|
References |
|
Tue, 21 Jan 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | RHACS: Cross-site scripting in portal | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-28T20:32:53.766Z
Reserved: 2025-01-20T13:46:54.279Z
Link: CVE-2022-4975

Updated: 2025-01-28T20:32:49.255Z

Status : Received
Published: 2025-01-27T14:15:27.210
Modified: 2025-01-27T14:15:27.210
Link: CVE-2022-4975
