Bug 690877 (CVE-2011-1523) - CVE-2011-1523 Nagios: XSS in the network status map CGI
Summary: CVE-2011-1523 Nagios: XSS in the network status map CGI
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-1523
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 690878 690879 690880 690881
Blocks: 734555
TreeView+ depends on / blocked
 
Reported: 2011-03-25 16:50 UTC by Jan Lieskovsky
Modified: 2021-10-19 21:48 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-19 21:48:17 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2011-03-25 16:50:51 UTC
Cross-site scripting (XSS) vulnerability in Nagios allows remote
attackers to inject arbitrary web script or HTML via specially-crafted
'layer' parameter passed to the Nagios network status map CGI script
(statusmap.cgi).

References:
[1] http://tracker.nagios.org/view.php?id=207
[2] http://www.rul3z.de/advisories/SSCHADV2011-002.txt
[3] http://secunia.com/advisories/43287/

Public PoC (from [2):
=====================
http://site/nagios/cgi-bin/statusmap.cgi?layer=' onmouseover="alert('XSS')" '

Comment 1 Jan Lieskovsky 2011-03-25 16:53:37 UTC
This issue affects the version of the nagios package, as shipped
with Red Hat HPC Solution.

--

This issue affects the versions of the nagios package, as shipped
with Fedora release of 13 and 14.

This issue affects the versions of the nagios package, as present
within EPEL-4, EPEL-5, and EPEL-6 repositories.

Please schedule an update.

Comment 2 Jan Lieskovsky 2011-03-25 16:55:14 UTC
Created nagios tracking bugs for this issue

Affects: epel-4 [bug 690878]
Affects: epel-5 [bug 690879]
Affects: epel-6 [bug 690880]
Affects: fedora-all [bug 690881]

Comment 4 Jan Lieskovsky 2011-03-28 14:40:45 UTC
The CVE identifier of CVE-2011-1523 has been assigned to this issue
(http://www.openwall.com/lists/oss-security/2011/03/28/4).

Comment 5 Huzaifa S. Sidhpurwala 2011-09-07 07:30:18 UTC
Upstream patch:
http://nagios.svn.sourceforge.net/viewvc/nagios?view=revision&revision=1741

Comment 6 Huzaifa S. Sidhpurwala 2011-09-07 10:12:18 UTC
Statement:

This issue affects the Red Hat HPC Solution which is End of Life. For more information please refer to:
https://access.redhat.com/support/policy/updates/hpc/


Note You need to log in before you can comment on or make changes to this bug.