First published: Wed Jun 01 2011(Updated: )
It was reported [1],[2] that an XSS vulnerability exists in Nagios when viewing the configuration and using command expansion, as there is no input validation for "expand" in config.c(gi): View Config -> Command Expansion -> To expand -> <script>alert(String.fromCharCode(88,83,83))</script> View Config -> Command Expansion -> To expand -> <body onload=alert(666)> or <a href="http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand">http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand</a>=<script>alert(String.fromCharCode(88,83,83))</script> [^] <a href="http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand">http://www.example.com/nagios/cgi-bin/config.cgi?type=command&expand</a>=<body [^] onload=alert(666)> [1] <a href="http://tracker.nagios.org/view.php?id=224">http://tracker.nagios.org/view.php?id=224</a> [2] <a href="http://seclists.org/bugtraq/2011/Jun/17">http://seclists.org/bugtraq/2011/Jun/17</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Plugins |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-709871 is classified as high due to its potential for cross-site scripting (XSS) attacks.
To fix REDHAT-BUG-709871, ensure proper input validation is implemented in the configuration command expansion feature.
REDHAT-BUG-709871 affects installations of Nagios that allow command expansion without input validation.
REDHAT-BUG-709871 is a cross-site scripting (XSS) vulnerability that arises from improper handling of user input.
Yes, REDHAT-BUG-709871 can be exploited remotely, allowing attackers to execute scripts in the context of the victim's browser.