First published: Thu Dec 20 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in ganglia-web in Ganglia before 3.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) c and (2) h parameters to (a) web/host_gmetrics.php; the (3) G, (4) me, (5) x, (6) n, (7) v, (8) l, (9) vl, and (10) st parameters to (b) web/graph.php; and the (11) c, (12) G, (13) h, (14) r, (15) m, (16) s, (17) cr, (18) hc, (19) sh, (20) p, (21) t, (22) jr, (23) js, (24) gw, (25) z, and (26) gs parameters to (c) web/get_context.php. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ganglia PHP RRD Web Client | <=3.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6465 is categorized as a medium severity vulnerability due to its potential for remote code execution through cross-site scripting.
To fix CVE-2007-6465, upgrade Ganglia to version 3.0.6 or later, which addresses the XSS vulnerabilities.
CVE-2007-6465 can enable remote attackers to perform cross-site scripting attacks, potentially leading to session hijacking or data theft.
Ganglia versions prior to 3.0.6, including all 3.0.x releases and earlier, are affected by CVE-2007-6465.
The vulnerable components of Ganglia in CVE-2007-6465 include the web interface, specifically the host_gmetrics.php file and several parameters used within it.