First published: Fri Jan 20 2012(Updated: )
A flaw was reported [1] in smokeping 2.6 (and most likely earlier versions) which malicious remote users could abuse to conduct cross-site scripting attacks.. Input passed to the "displaymode" parameter in the smokeping CGI script is not properly sanitized before being returned to the user, which can be used to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Smokeping 2.6.7 has been released to correct this flaw. [1] <a href="http://holisticinfosec.org/content/view/188/45/">http://holisticinfosec.org/content/view/188/45/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oetiker Smokeping | <=2.6.6 | |
Oetiker Smokeping | =0.99.5 | |
Oetiker Smokeping | =0.99.6 | |
Oetiker Smokeping | =0.99.7 | |
Oetiker Smokeping | =0.99.8 | |
Oetiker Smokeping | =0.99.9 | |
Oetiker Smokeping | =0.99.10 | |
Oetiker Smokeping | =0.99.11 | |
Oetiker Smokeping | =0.99.12 | |
Oetiker Smokeping | =0.99.13 | |
Oetiker Smokeping | =0.99.14 | |
Oetiker Smokeping | =0.99.15 | |
Oetiker Smokeping | =0.99.16 | |
Oetiker Smokeping | =0.99.17 | |
Oetiker Smokeping | =0.99.18 | |
Oetiker Smokeping | =1.0 | |
Oetiker Smokeping | =1.1 | |
Oetiker Smokeping | =1.2 | |
Oetiker Smokeping | =1.3 | |
Oetiker Smokeping | =1.4 | |
Oetiker Smokeping | =1.5 | |
Oetiker Smokeping | =1.6 | |
Oetiker Smokeping | =1.7 | |
Oetiker Smokeping | =1.8 | |
Oetiker Smokeping | =1.9 | |
Oetiker Smokeping | =1.10 | |
Oetiker Smokeping | =1.11 | |
Oetiker Smokeping | =1.12 | |
Oetiker Smokeping | =1.13 | |
Oetiker Smokeping | =1.14 | |
Oetiker Smokeping | =1.15 | |
Oetiker Smokeping | =1.16 | |
Oetiker Smokeping | =1.17 | |
Oetiker Smokeping | =1.18 | |
Oetiker Smokeping | =1.19 | |
Oetiker Smokeping | =1.20 | |
Oetiker Smokeping | =1.21 | |
Oetiker Smokeping | =1.22 | |
Oetiker Smokeping | =1.23 | |
Oetiker Smokeping | =1.24 | |
Oetiker Smokeping | =1.25 | |
Oetiker Smokeping | =1.26 | |
Oetiker Smokeping | =1.27 | |
Oetiker Smokeping | =1.28 | |
Oetiker Smokeping | =1.29 | |
Oetiker Smokeping | =1.30 | |
Oetiker Smokeping | =1.31 | |
Oetiker Smokeping | =1.34 | |
Oetiker Smokeping | =1.36 | |
Oetiker Smokeping | =1.37 | |
Oetiker Smokeping | =1.38 | |
Oetiker Smokeping | =2.0-rc1 | |
Oetiker Smokeping | =2.0-rc2 | |
Oetiker Smokeping | =2.0-rc3 | |
Oetiker Smokeping | =2.0.0 | |
Oetiker Smokeping | =2.0.1 | |
Oetiker Smokeping | =2.0.2 | |
Oetiker Smokeping | =2.0.3 | |
Oetiker Smokeping | =2.0.4 | |
Oetiker Smokeping | =2.0.5 | |
Oetiker Smokeping | =2.0.6 | |
Oetiker Smokeping | =2.0.7 | |
Oetiker Smokeping | =2.0.8 | |
Oetiker Smokeping | =2.0.9 | |
Oetiker Smokeping | =2.1.0 | |
Oetiker Smokeping | =2.1.1 | |
Oetiker Smokeping | =2.2.0 | |
Oetiker Smokeping | =2.2.1 | |
Oetiker Smokeping | =2.2.2 | |
Oetiker Smokeping | =2.2.3 | |
Oetiker Smokeping | =2.2.4 | |
Oetiker Smokeping | =2.2.5 | |
Oetiker Smokeping | =2.2.6 | |
Oetiker Smokeping | =2.2.7 | |
Oetiker Smokeping | =2.3.0 | |
Oetiker Smokeping | =2.3.1 | |
Oetiker Smokeping | =2.3.2 | |
Oetiker Smokeping | =2.3.3 | |
Oetiker Smokeping | =2.3.4 | |
Oetiker Smokeping | =2.3.5 | |
Oetiker Smokeping | =2.3.6 | |
Oetiker Smokeping | =2.4.0 | |
Oetiker Smokeping | =2.4.1 | |
Oetiker Smokeping | =2.4.2 | |
Oetiker Smokeping | =2.5.0 | |
Oetiker Smokeping | =2.5.1 | |
Oetiker Smokeping | =2.6.0 | |
Oetiker Smokeping | =2.6.1 | |
Oetiker Smokeping | =2.6.2 | |
Oetiker Smokeping | =2.6.3 | |
Oetiker Smokeping | =2.6.4 | |
Oetiker Smokeping | =2.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0790 is classified as a moderate severity vulnerability due to the risk of cross-site scripting attacks.
To fix CVE-2012-0790, it is recommended to update to a version of Smokeping that properly sanitizes user input in the 'displaymode' parameter.
CVE-2012-0790 affects Smokeping versions 2.6 and earlier, including multiple versions from 0.99.5 to 2.6.5.
An attacker can execute cross-site scripting (XSS) attacks by injecting malicious scripts through the 'displaymode' parameter.
A temporary workaround for CVE-2012-0790 may involve disabling the functionality that utilizes the vulnerable 'displaymode' parameter until a patch can be applied.