Product:NagVis
Download: https://github.com/NagVis/nagvis
Vunlerable Version: lastest version and probably prior
Tested Version: lastest version
Author: ADLab of Venustech
Advisory Details:
I have discovered a Cross-Site Scripting (XSS) in “nagvis”, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in “object_id” HTTP GET parameter passed to “nagvis-master/share/userfiles/gadgets/std_table.php” url. An attacker could execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc: http://localhost/.../nagvis-master/share/userfiles/gadgets/std_table.php?object_id=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
The text was updated successfully, but these errors were encountered:
Product:NagVis
Download: https://github.com/NagVis/nagvis
Vunlerable Version: lastest version and probably prior
Tested Version: lastest version
Author: ADLab of Venustech
Advisory Details:
I have discovered a Cross-Site Scripting (XSS) in “nagvis”, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in “object_id” HTTP GET parameter passed to “nagvis-master/share/userfiles/gadgets/std_table.php” url. An attacker could execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
http://localhost/.../nagvis-master/share/userfiles/gadgets/std_table.php?object_id=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
The text was updated successfully, but these errors were encountered: