Lucene search

K
githubGitHub Advisory DatabaseGHSA-RV5Q-72P2-2Q24
HistorySep 27, 2022 - 12:00 a.m.

Centreon contains cross-site scripting vulnerability via esc_name parameter

2022-09-2700:00:20
CWE-79
GitHub Advisory Database
github.com
3
centreon
cross-site scripting
v20.10.18
escalation name
configuration
notifications
escalations
vulnerability
web scripts
html
crafted payload
patches

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

21.4%

Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload. Versions 21.04.16, 21.10.8, and 22.04.2 contain patches.

Affected configurations

Vulners
Node
centreoncentreonRange<22.04.1
OR
centreoncentreonRange<21.10.8
OR
centreoncentreonRange<21.04.16

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

21.4%

Related for GHSA-RV5Q-72P2-2Q24