-
Type:
Defect (Security)
-
Resolution: Fixed
-
Priority:
Blocker
-
Affects Version/s: 1.8.5
-
Component/s: Frontend (F)
-
Environment:Debian GNU/Linux 5.0.8 (Lenny)
Apache 2.2.16
PHP 5.3.3
Tested with:
Mozilla Firefox 5.0
These URL's are vulnerable to persistent XSS attacks due to improper sanitation of gname variable when creating user and host groups.
URL:
hostgroups.php
usergrps.php
Vulnerable parameter:
gname
Method:
POST
Injected:
"</options><script>alert('XSS')</script>
Persists in:
http://test/zabbix/hostgroups.php
http://test/zabbix/users.php
http://test/zabbix/hosts.php?form=update&hostid=N (where N is a valid hostid)
http://test/zabbix/scripts.php?form=1&scriptid=N (where N is a valid scriptid)
http://test/zabbix/maintenance.php
- is duplicated by
-
ZBX-4413 nbsp in "event generation" dropdown
-
- Closed
-