Cross-site scripting (XSS) vulnerability in the handle_request function in lib/HTTPServer.pm in Monitorix before 3.4.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/mikaku/Monitorix/issues/30 | third party advisory issue tracking exploit |
http://openwall.com/lists/oss-security/2013/12/12/8 | mailing list third party advisory exploit |
https://github.com/mikaku/Monitorix/commit/e86c11593238be6956a67a04d640c65810d50b59 | third party advisory patch |