First published: Tue Dec 27 2022(Updated: )
A vulnerability classified as problematic was found in Nagios NCPA. This vulnerability affects unknown code of the file agent/listener/templates/tail.html. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 2.4.0 is able to address this issue. The name of the patch is 5abbcd7aa26e0fc815e6b2b0ffe1c15ef3e8fab5. It is recommended to upgrade the affected component. VDB-216874 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Nagios Cross Platform Agent | <2.4.0 | |
<2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-4285.
The severity of CVE-2021-4285 is medium with a CVSS score of 6.1.
CVE-2021-4285 affects Nagios NCPA by allowing remote attackers to initiate a cross-site scripting attack through the manipulation of the 'name' argument in the 'tail.html' file.
To mitigate CVE-2021-4285, it is recommended to upgrade to version 2.4.0 of Nagios NCPA.
The CWE associated with CVE-2021-4285 is CWE-79 (Cross-Site Scripting).