oss-sec mailing list archives
CVE request: XSS flaw in Ganglia web interface
From: Murray McAllister <mmcallis () redhat com>
Date: Tue, 26 Nov 2013 14:54:01 +1100
Hello,A cross-site scripting (XSS) flaw was discovered in the Ganglia web interface:
https://github.com/ganglia/ganglia-web/issues/218 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507 Quoting from the original report: "" Temporary Workaround and Fix ============================ Apply the following patch to properly encode the variable: --- header.php.old 2013-09-30 21:07:26.272287657 +0200 +++ header.php 2013-09-30 21:09:42.226281990 +0200 @@ -491,7 +491,7 @@ $data->assign("custom_time", $custom_tim ///////////////////////////////////////////////////////////////////////// if ( $context == "cluster" ) { if ( isset($user['host_regex']) && $user['host_regex'] != "" ) - $set_host_regex_value="value='" . $user['host_regex'] . "'";+ $set_host_regex_value="value='" . htmlentities($user['host_regex'], ENT_QUOTES) . "'";
else $set_host_regex_value=""; ""The fix does not apply to the older versions in EPEL (3.0.7 and 3.1.7), but I did not test to see if they were affected.
Can a CVE please be assigned if one has not been already? Thanks, -- Murray McAllister / Red Hat Security Response Team
Current thread:
- CVE request: XSS flaw in Ganglia web interface Murray McAllister (Nov 25)
- Re: CVE request: XSS flaw in Ganglia web interface Kurt Seifried (Nov 26)