Ganglia web interface XSS

2013-11-26 / 2013-11-27
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

A cross-site scripting (XSS) flaw was discovered in the Ganglia web interface: https://github.com/ganglia/ganglia-web/issues/218 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507 Quoting from the original report: "" Temporary Workaround and Fix ============================ Apply the following patch to properly encode the variable: --- header.php.old 2013-09-30 21:07:26.272287657 +0200 +++ header.php 2013-09-30 21:09:42.226281990 +0200 @@ -491,7 +491,7 @@ $data->assign("custom_time", $custom_tim ///////////////////////////////////////////////////////////////////////// if ( $context == "cluster" ) { if ( isset($user['host_regex']) && $user['host_regex'] != "" ) - $set_host_regex_value="value='" . $user['host_regex'] . "'"; + $set_host_regex_value="value='" . htmlentities($user['host_regex'], ENT_QUOTES) . "'"; else $set_host_regex_value=""; "" The fix does not apply to the older versions in EPEL (3.0.7 and 3.1.7), but I did not test to see if they were affected. Can a CVE please be assigned if one has not been already? Thanks,

References:

https://github.com/ganglia/ganglia-web/issues/218
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top