A cross-site scripting (XSS) flaw was discovered in the Ganglia web interface:
https://github.com/ganglia/ganglia-web/issues/218
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507
Quoting from the original report:
""
Temporary Workaround and Fix
============================
Apply the following patch to properly encode the variable:
--- header.php.old 2013-09-30 21:07:26.272287657 +0200
+++ header.php 2013-09-30 21:09:42.226281990 +0200
@@ -491,7 +491,7 @@ $data->assign("custom_time", $custom_tim
/////////////////////////////////////////////////////////////////////////
if ( $context == "cluster" ) {
if ( isset($user['host_regex']) && $user['host_regex'] != "" )
- $set_host_regex_value="value='" . $user['host_regex'] . "'";
+ $set_host_regex_value="value='" . htmlentities($user['host_regex'], ENT_QUOTES) . "'";
else
$set_host_regex_value="";
""
The fix does not apply to the older versions in EPEL (3.0.7 and 3.1.7), but I did not test to see if they were affected.
Can a CVE please be assigned if one has not been already?
Thanks,