First published: Fri Jan 20 2012(Updated: )
A flaw was reported [1] in smokeping 2.6 (and most likely earlier versions) which malicious remote users could abuse to conduct cross-site scripting attacks.. Input passed to the "displaymode" parameter in the smokeping CGI script is not properly sanitized before being returned to the user, which can be used to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Smokeping 2.6.7 has been released to correct this flaw. [1] <a href="http://holisticinfosec.org/content/view/188/45/">http://holisticinfosec.org/content/view/188/45/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Oetiker Smokeping | <2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-783584 is categorized as a potential security vulnerability due to the risk of cross-site scripting attacks.
To fix REDHAT-BUG-783584, ensure that you sanitize input passed to the 'displaymode' parameter in the smokeping CGI script.
Smokeping versions up to and including 2.6 are affected by REDHAT-BUG-783584.
REDHAT-BUG-783584 allows malicious remote users to conduct cross-site scripting attacks.
The vulnerability REDHAT-BUG-783584 was reported by an unknown individual or entity as part of the bug tracking process.