Linux Distros 未修补的漏洞: CVE-2023-39319

medium Nessus 插件 ID 226039

简介

Linux/Unix 主机上安装的一个或多个程序包存在漏洞,但供应商表示不会修补此漏洞。

描述

Linux/Unix 主机中安装的一个或多个程序包受到一个漏洞影响,而供应商没有提供补丁程序。

- html/模版程序包没有应用正确的规则来处理出现的 <script, <!--, 情形和 </script within JS literals in ><script> 环境。这可能会导致模板解析器错误地将脚本上下文考虑为提前终止,从而导致操作被错误转义。这可被用于执行 XSS 攻击。(CVE-2023-39319)

请注意,Nessus 依赖供应商报告的程序包是否存在进行判断。

解决方案

目前尚未有任何已知的解决方案。

另见

https://access.redhat.com/security/cve/cve-2023-39319

https://security-tracker.debian.org/tracker/CVE-2023-39319

https://ubuntu.com/security/CVE-2023-39319

插件详情

严重性: Medium

ID: 226039

文件名: unpatched_CVE_2023_39319.nasl

版本: 1.2

类型: local

代理: unix

系列: Misc.

发布时间: 2025/3/5

最近更新时间: 2025/8/18

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: Low

分数: 3.0

CVSS v2

风险因素: Medium

基本分数: 4.3

时间分数: 3.2

矢量: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS 分数来源: CVE-2023-39319

CVSS v3

风险因素: Medium

基本分数: 6.1

时间分数: 5.3

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: cpe:/o:debian:debian_linux:11.0, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:redhat:enterprise_linux:grafana-cloudwatch, p-cpe:/a:redhat:enterprise_linux:grafana-elasticsearch, p-cpe:/a:redhat:enterprise_linux:grafana-graphite, p-cpe:/a:redhat:enterprise_linux:grafana-opentsdb, p-cpe:/a:redhat:enterprise_linux:grafana-postgres, p-cpe:/a:redhat:enterprise_linux:grafana-stackdriver, p-cpe:/a:centos:centos:grafana-cloudwatch, p-cpe:/a:centos:centos:grafana-elasticsearch, p-cpe:/a:centos:centos:grafana-graphite, p-cpe:/a:centos:centos:grafana-opentsdb, p-cpe:/a:centos:centos:grafana-postgres, p-cpe:/a:centos:centos:grafana-stackdriver, p-cpe:/a:canonical:ubuntu_linux:golang-1.10, p-cpe:/a:redhat:enterprise_linux:grafana-pcp, p-cpe:/a:centos:centos:grafana-pcp, p-cpe:/a:canonical:ubuntu_linux:golang-1.16, p-cpe:/a:redhat:enterprise_linux:grafana-selinux, p-cpe:/a:centos:centos:grafana-selinux, p-cpe:/a:debian:debian_linux:golang-1.15, p-cpe:/a:debian:debian_linux:golang-1.19, p-cpe:/a:canonical:ubuntu_linux:golang-1.8, cpe:/o:redhat:enterprise_linux:8, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:redhat:enterprise_linux:grafana, p-cpe:/a:redhat:enterprise_linux:grafana-azure-monitor, p-cpe:/a:redhat:enterprise_linux:grafana-influxdb, p-cpe:/a:redhat:enterprise_linux:grafana-loki, p-cpe:/a:redhat:enterprise_linux:grafana-mssql, p-cpe:/a:redhat:enterprise_linux:grafana-mysql, p-cpe:/a:redhat:enterprise_linux:grafana-prometheus, p-cpe:/a:redhat:enterprise_linux:ignition, cpe:/o:centos:centos:8, p-cpe:/a:centos:centos:grafana, p-cpe:/a:centos:centos:grafana-azure-monitor, p-cpe:/a:centos:centos:grafana-influxdb, p-cpe:/a:centos:centos:grafana-loki, p-cpe:/a:centos:centos:grafana-mssql, p-cpe:/a:centos:centos:grafana-mysql, p-cpe:/a:centos:centos:grafana-prometheus, p-cpe:/a:canonical:ubuntu_linux:golang-1.14, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, cpe:/o:redhat:enterprise_linux:9, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:canonical:ubuntu_linux:golang-1.13, p-cpe:/a:redhat:enterprise_linux:osbuild-composer, p-cpe:/a:redhat:enterprise_linux:osbuild-composer-core, p-cpe:/a:redhat:enterprise_linux:osbuild-composer-dnf-json, p-cpe:/a:redhat:enterprise_linux:osbuild-composer-worker, p-cpe:/a:centos:centos:osbuild-composer, p-cpe:/a:centos:centos:osbuild-composer-core, p-cpe:/a:centos:centos:osbuild-composer-dnf-json, p-cpe:/a:centos:centos:osbuild-composer-worker, p-cpe:/a:canonical:ubuntu_linux:golang-1.6, p-cpe:/a:canonical:ubuntu_linux:golang-1.9, p-cpe:/a:centos:centos:ignition

必需的 KB 项: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier

易利用性: No known exploits are available

漏洞发布日期: 2023/9/7

参考资料信息

CVE: CVE-2023-39319