{"id":"CVE-2016-6319","details":"Cross-site scripting (XSS) vulnerability in app/helpers/form_helper.rb in Foreman before 1.12.2, as used by Remote Execution and possibly other plugins, allows remote attackers to inject arbitrary web script or HTML via the label parameter.","modified":"2026-03-20T11:12:52.233660Z","published":"2016-08-19T21:59:14.277Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0336"},{"type":"ADVISORY","url":"https://theforeman.org/security.html#2016-6319"},{"type":"ADVISORY","url":"http://projects.theforeman.org/issues/16019"},{"type":"ADVISORY","url":"http://projects.theforeman.org/issues/16024"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1365815"},{"type":"FIX","url":"https://github.com/theforeman/foreman/commit/0f35fe14acf0d0d3b55e9337bc5e2b9640ff2372"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/theforeman/foreman","events":[{"introduced":"0"},{"fixed":"0f35fe14acf0d0d3b55e9337bc5e2b9640ff2372"}]},{"type":"GIT","repo":"https://github.com/theforeman/smart-proxy","events":[{"introduced":"0"},{"last_affected":"4252c1083d5e16c375cd450abdf6fd24ac952048"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.12.1"}]}}],"versions":["0.1","0.1-1","0.1-2","0.1-3","0.1-4","0.1-5","0.1-6","0.2","0.2rc1","0.2rc2","0.3","0.3.1","0.4","0.4rc2","0.4rc3","0.4rc4","0.4rc5","1.0","1.0RC1","1.0RC2","1.0RC3","1.0RC4","1.0RC5","1.1","1.12.0","1.12.0-RC1","1.12.0-RC2","1.12.0-RC3","1.12.1","1.1RC1","1.1RC2","1.1RC3","1.1RC4","1.1RC5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6319.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}