CVE-2011-2179

Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html
http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html Exploit Patch
http://secunia.com/advisories/44974
http://securityreason.com/securityalert/8274
http://tracker.nagios.org/view.php?id=224 Exploit Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2011/06/01/10
http://www.openwall.com/lists/oss-security/2011/06/02/6
http://www.rul3z.de/advisories/SSCHADV2011-005.txt Exploit Patch
http://www.rul3z.de/advisories/SSCHADV2011-006.txt Exploit Patch
http://www.securityfocus.com/bid/48087
http://www.ubuntu.com/usn/USN-1151-1
https://bugzilla.redhat.com/show_bug.cgi?id=709871
https://dev.icinga.org/issues/1605 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67797
http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html
http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html Exploit Patch
http://secunia.com/advisories/44974
http://securityreason.com/securityalert/8274
http://tracker.nagios.org/view.php?id=224 Exploit Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2011/06/01/10
http://www.openwall.com/lists/oss-security/2011/06/02/6
http://www.rul3z.de/advisories/SSCHADV2011-005.txt Exploit Patch
http://www.rul3z.de/advisories/SSCHADV2011-006.txt Exploit Patch
http://www.securityfocus.com/bid/48087
http://www.ubuntu.com/usn/USN-1151-1
https://bugzilla.redhat.com/show_bug.cgi?id=709871
https://dev.icinga.org/issues/1605 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67797
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:27

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html - () http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html -
References () http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html - Exploit, Patch () http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html - Exploit, Patch
References () http://secunia.com/advisories/44974 - () http://secunia.com/advisories/44974 -
References () http://securityreason.com/securityalert/8274 - () http://securityreason.com/securityalert/8274 -
References () http://tracker.nagios.org/view.php?id=224 - Exploit, Patch, Vendor Advisory () http://tracker.nagios.org/view.php?id=224 - Exploit, Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2011/06/01/10 - () http://www.openwall.com/lists/oss-security/2011/06/01/10 -
References () http://www.openwall.com/lists/oss-security/2011/06/02/6 - () http://www.openwall.com/lists/oss-security/2011/06/02/6 -
References () http://www.rul3z.de/advisories/SSCHADV2011-005.txt - Exploit, Patch () http://www.rul3z.de/advisories/SSCHADV2011-005.txt - Exploit, Patch
References () http://www.rul3z.de/advisories/SSCHADV2011-006.txt - Exploit, Patch () http://www.rul3z.de/advisories/SSCHADV2011-006.txt - Exploit, Patch
References () http://www.securityfocus.com/bid/48087 - () http://www.securityfocus.com/bid/48087 -
References () http://www.ubuntu.com/usn/USN-1151-1 - () http://www.ubuntu.com/usn/USN-1151-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=709871 - () https://bugzilla.redhat.com/show_bug.cgi?id=709871 -
References () https://dev.icinga.org/issues/1605 - Exploit, Patch, Vendor Advisory () https://dev.icinga.org/issues/1605 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/67797 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/67797 -

Information

Published : 2011-06-14 17:55

Updated : 2024-11-21 01:27


NVD link : CVE-2011-2179

Mitre link : CVE-2011-2179

CVE.ORG link : CVE-2011-2179


JSON object : View

Products Affected

icinga

  • icinga

nagios

  • nagios
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')