Cross-site Scripting (XSS) Affecting ganglia-web package, versions <3.6.1-1
Threat Intelligence
EPSS
0.27% (69th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-GANGLIAWEB-281224
- published 5 Dec 2013
- disclosed 5 Dec 2013
How to fix?
Upgrade Debian:unstable
ganglia-web
to version 3.6.1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ganglia-web
package and not the ganglia-web
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Cross-site scripting (XSS) vulnerability in header.php in Ganglia Web 3.5.8 and 3.5.10 allows remote attackers to inject arbitrary web script or HTML via the host_regex parameter to the default URI, which is processed by get_context.php.
References
- https://security-tracker.debian.org/tracker/CVE-2013-6395
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507
- https://github.com/ganglia/ganglia-web/issues/218
- http://osvdb.org/100380
- http://www.rusty-ice.de/advisory/advisory_2013002.txt
- http://seclists.org/oss-sec/2013/q4/346
- http://secunia.com/advisories/55854
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89272
CVSS Scores
version 3.1