An issue was discovered in Netdata 1.10.0. Log Injection (or Log Forgery) exists via a %0a sequence in the url parameter to api/v1/registry.
References
Link | Resource |
---|---|
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | Patch Third Party Advisory |
https://github.com/netdata/netdata/pull/4521 | Third Party Advisory |
https://www.red4sec.com/cve/netdata_log_injection.txt | Exploit Third Party Advisory |
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | Patch Third Party Advisory |
https://github.com/netdata/netdata/pull/4521 | Third Party Advisory |
https://www.red4sec.com/cve/netdata_log_injection.txt | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca - Patch, Third Party Advisory | |
References | () https://github.com/netdata/netdata/pull/4521 - Third Party Advisory | |
References | () https://www.red4sec.com/cve/netdata_log_injection.txt - Exploit, Third Party Advisory |
Information
Published : 2019-06-18 16:15
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18838
Mitre link : CVE-2018-18838
CVE.ORG link : CVE-2018-18838
JSON object : View
Products Affected
my-netdata
- netdata
CWE
CWE-116
Improper Encoding or Escaping of Output