Multiple cross-site scripting (XSS) vulnerabilities in Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allow remote attackers to inject arbitrary web script or HTML via the (1) hostname or (2) description parameter to host.php, or (3) the host_id parameter to data_sources.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2010/1203 | vdb entry patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:160 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=609093 | |
http://secunia.com/advisories/41041 | third party advisory vendor advisory |
http://www.cacti.net/release_notes_0_8_7f.php | |
https://rhn.redhat.com/errata/RHSA-2010-0635.html | vendor advisory |
http://www.securityfocus.com/archive/1/511393 | mailing list |
http://www.vupen.com/english/advisories/2010/2132 | vdb entry |
http://www.securityfocus.com/bid/40332 | vdb entry |
http://svn.cacti.net/viewvc?view=rev&revision=5901 |