First published: Wed Jun 01 2011(Updated: )
It was reported [1],[2] that an XSS vulnerability exists in Nagios when viewing the configuration and using command expansion, as there is no input validation for "expand" in config.c(gi): View Config -> Command Expansion -> To expand -> <script>alert(String.fromCharCode(88,83,83))</script> View Config -> Command Expansion -> To expand -> <body onload=alert(666)> or <a href="http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand">http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand</a>=<script>alert(String.fromCharCode(88,83,83))</script> [^] <a href="http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand">http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand</a>=<body [^] onload=alert(666)> [1] <a href="http://tracker.nagios.org/view.php?id=224">http://tracker.nagios.org/view.php?id=224</a> [2] <a href="http://seclists.org/bugtraq/2011/Jun/17">http://seclists.org/bugtraq/2011/Jun/17</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Icinga Icinga | =0.8.1 | |
Icinga Icinga | =0.8.4 | |
Icinga Icinga | =1.0.2 | |
Icinga Icinga | =1.2.1 | |
Icinga Icinga | =0.8.3 | |
Icinga Icinga | =0.8.0 | |
Icinga Icinga | =1.3.0 | |
Icinga Icinga | =0.8.2 | |
Icinga Icinga | =1.0.3 | |
Icinga Icinga | =1.3.1 | |
Icinga Icinga | =1.0 | |
Icinga Icinga | <=1.4.0 | |
Icinga Icinga | =1.0-rc1 | |
Nagios Nagios | =3.2.3 | |
Icinga Icinga | =1.2.0 | |
Icinga Icinga | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.