Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow (1) remote Xymon clients to inject arbitrary web script or HTML via a status-message, which is not properly handled in the "detailed status" page, or (2) remote authenticated users to inject arbitrary web script or HTML via an acknowledgement message, which is not properly handled in the "status" page.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Xymon | Xymon | 4.1.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Exe
- http://www.debian.org/security/2016/dsa-3495
- http://www.securityfocus.com/archive/1/537522/100/0/threaded
- https://sourceforge.net/p/xymon/code/7892/Patch
- http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Exe
- http://www.debian.org/security/2016/dsa-3495
- http://www.securityfocus.com/archive/1/537522/100/0/threaded
- https://sourceforge.net/p/xymon/code/7892/Patch
FAQ
What is CVE-2016-2058?
CVE-2016-2058 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow (1) remote Xymon clients to inject arbitrary web script or HTML via a status-message, which is ...
How severe is CVE-2016-2058?
CVE-2016-2058 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2058?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Xymon Xymon.