DEBIAN-CVE-2019-10180

Source
https://security-tracker.debian.org/tracker/CVE-2019-10180
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2019-10180.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2019-10180
Upstream
Published
2020-03-31T17:15:25Z
Modified
2025-09-30T05:12:37.675531Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.

References

Affected packages

Debian:11 / dogtag-pki

Package

Name
dogtag-pki
Purl
pkg:deb/debian/dogtag-pki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.10.2-3
10.10.6-1

11.*

11.0.0-1
11.0.3-1
11.0.3-2
11.0.3-3
11.0.3-4
11.0.6-1
11.0.6-2
11.2.1-1
11.2.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}