Vulnerability Description
Cross-site scripting (XSS) vulnerability in the handle_request function in lib/HTTPServer.pm in Monitorix before 3.4.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fibranet | Monitorix | < 3.4.0 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2013/12/12/8ExploitMailing ListThird Party Advisory
- https://github.com/mikaku/Monitorix/commit/e86c11593238be6956a67a04d640c65810d50PatchThird Party Advisory
- https://github.com/mikaku/Monitorix/issues/30ExploitIssue TrackingThird Party Advisory
- http://openwall.com/lists/oss-security/2013/12/12/8ExploitMailing ListThird Party Advisory
- https://github.com/mikaku/Monitorix/commit/e86c11593238be6956a67a04d640c65810d50PatchThird Party Advisory
- https://github.com/mikaku/Monitorix/issues/30ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2013-7071?
CVE-2013-7071 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Cross-site scripting (XSS) vulnerability in the handle_request function in lib/HTTPServer.pm in Monitorix before 3.4.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
How severe is CVE-2013-7071?
CVE-2013-7071 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7071?
Check the references section above for vendor advisories and patch information. Affected products include: Fibranet Monitorix.