Cross-site scripting (XSS) vulnerability in the charts module in Greenbone Security Assistant (GSA) 6.x before 6.0.8 allows remote attackers to inject arbitrary web script or HTML via the aggregate_type parameter in a get_aggregate command to omp.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://en.internetwache.org/cve-2016-1926-xss-in-the-greenbone-security-assistant-20-01-2016/ | third party advisory exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183371.html | third party advisory vendor advisory |
http://www.greenbone.net/technology/gbsa2016-01.html | broken link vendor advisory |
http://www.openvas.org/OVSA20160113.html | third party advisory |
http://www.securityfocus.com/archive/1/537335/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/135328/OpenVAS-Greenbone-Security-Assistant-Cross-Site-Scripting.html | third party advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184478.html | third party advisory vendor advisory |