Vulnerability Description
Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload in his Name. When any admin views this, the XSS is triggered.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nagios | Nagios | 2.1.3 |
Related Weaknesses (CWE)
References
- https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXTRelease NotesVendor Advisory
- https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-
- https://www.nagios.com/products/nagios-log-server/Product
- https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXTRelease NotesVendor Advisory
- https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-
- https://www.nagios.com/products/nagios-log-server/Product
FAQ
What is CVE-2020-6586?
CVE-2020-6586 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload i...
How severe is CVE-2020-6586?
CVE-2020-6586 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6586?
Check the references section above for vendor advisories and patch information. Affected products include: Nagios Nagios.