Cross-site scripting (XSS) vulnerability in the waterfall web status view (status/web/waterfall.py) in Buildbot 0.7.6 through 0.7.11p1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00985.html | patch vendor advisory |
http://sourceforge.net/mailarchive/message.php?msg_name=42338fbf0908121232mb790a6cn787ac3de90e8bc31%40mail.gmail.com | patch mailing list |
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00978.html | patch vendor advisory |
http://www.vupen.com/english/advisories/2009/2352 | patch vendor advisory vdb entry |
http://buildbot.net/trac#SecurityAlert | patch |
http://secunia.com/advisories/36352 | third party advisory vendor advisory |
http://secunia.com/advisories/36418 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/36100 | patch vdb entry |