<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2012-6662</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2012-6662</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>2</Number>
        <Date>2024-06-12T02:01:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-10-31T01:46:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-12T02:01:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2012-6662</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Liberty Linux 7">
      <Branch Type="Product Name" Name="SUSE Liberty Linux 7">
        <FullProductName ProductID="SUSE Liberty Linux 7" CPE="cpe:/o:suse:sll:7">SUSE Liberty Linux 7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ipa-admintools-4.1.0-18.el7">
      <FullProductName ProductID="ipa-admintools-4.1.0-18.el7">ipa-admintools-4.1.0-18.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipa-client-4.1.0-18.el7">
      <FullProductName ProductID="ipa-client-4.1.0-18.el7">ipa-client-4.1.0-18.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipa-python-4.1.0-18.el7">
      <FullProductName ProductID="ipa-python-4.1.0-18.el7">ipa-python-4.1.0-18.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipa-server-4.1.0-18.el7">
      <FullProductName ProductID="ipa-server-4.1.0-18.el7">ipa-server-4.1.0-18.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ipa-server-trust-ad-4.1.0-18.el7">
      <FullProductName ProductID="ipa-server-trust-ad-4.1.0-18.el7">ipa-server-trust-ad-4.1.0-18.el7</FullProductName>
    </Branch>
    <Relationship ProductReference="ipa-admintools-4.1.0-18.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:ipa-admintools-4.1.0-18.el7">ipa-admintools-4.1.0-18.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipa-client-4.1.0-18.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:ipa-client-4.1.0-18.el7">ipa-client-4.1.0-18.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipa-python-4.1.0-18.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:ipa-python-4.1.0-18.el7">ipa-python-4.1.0-18.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipa-server-4.1.0-18.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:ipa-server-4.1.0-18.el7">ipa-server-4.1.0-18.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="ipa-server-trust-ad-4.1.0-18.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:ipa-server-trust-ad-4.1.0-18.el7">ipa-server-trust-ad-4.1.0-18.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.</Note>
    </Notes>
    <CVE>CVE-2012-6662</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Liberty Linux 7:ipa-admintools-4.1.0-18.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:ipa-client-4.1.0-18.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:ipa-python-4.1.0-18.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:ipa-server-4.1.0-18.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:ipa-server-trust-ad-4.1.0-18.el7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.3</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:N/I:P/A:N</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
