First published: Fri Mar 25 2011(Updated: )
Cross-site scripting (XSS) vulnerability in Nagios allows remote attackers to inject arbitrary web script or HTML via specially-crafted 'layer' parameter passed to the Nagios network status map CGI script (statusmap.cgi). References: [1] <a href="http://tracker.nagios.org/view.php?id=207">http://tracker.nagios.org/view.php?id=207</a> [2] <a href="http://www.rul3z.de/advisories/SSCHADV2011-002.txt">http://www.rul3z.de/advisories/SSCHADV2011-002.txt</a> [3] <a href="http://secunia.com/advisories/43287/">http://secunia.com/advisories/43287/</a> Public PoC (from [2): ===================== <a href="http://site/nagios/cgi-bin/statusmap.cgi?layer">http://site/nagios/cgi-bin/statusmap.cgi?layer</a>=' onmouseover="alert('XSS')" '
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Plugins |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-690877 is considered high due to the potential for remote attackers to exploit the XSS vulnerability.
To fix REDHAT-BUG-690877, upgrade Nagios to the latest version that addresses the Cross-site scripting vulnerability.
The systems affected by REDHAT-BUG-690877 include installations of Nagios that utilize the network status map CGI script.
REDHAT-BUG-690877 is a Cross-site scripting (XSS) vulnerability.
Attackers can use REDHAT-BUG-690877 to inject arbitrary web scripts or HTML into the Nagios web interface.