stable

monitorix-3.10.1-1.fc28

FEDORA-2018-3b67a68763 created by mikaku 7 years ago for Fedora 28

Prior Monitorix versions are vulnerable to cross-site scripting (XSS), caused by improper validation of user-supplied input by the monitorix.cgi file. A remote attacker could exploit this vulnerability using some of the arguments provided (graph= or when=) in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

I would like to thank Sebastian Gilon from TestArmy for reporting that issue.

The rest of bugs fixed are, as always, reflected in the Changes file.

All users still using older versions are advised and encouraged to upgrade to this version, which resolves this security issue.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2018-3b67a68763

This update has been submitted for testing by mikaku.

7 years ago

This update has been pushed to testing.

7 years ago

This update has reached 3 days in testing and can be pushed to stable now if the maintainer wishes

7 years ago

This update has been submitted for batched by mikaku.

7 years ago

This update has been submitted for stable by mikaku.

7 years ago

This update has been pushed to stable.

7 years ago

Please log in to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-1
Stable by Karma
1
Stable by Time
disabled
Dates
submitted
7 years ago
in testing
7 years ago
in stable
7 years ago

Automated Test Results