-
Defect (Security)
-
Resolution: Fixed
-
Blocker
-
1.8.5
-
Debian GNU/Linux 5.0.8 (Lenny)
Apache 2.2.16
PHP 5.3.3
Tested with:
Mozilla Firefox 5.0
These URL's are vulnerable to persistent XSS attacks due to improper sanitation of gname variable when creating user and host groups.
URL:
hostgroups.php
usergrps.php
Vulnerable parameter:
gname
Method:
POST
Injected:
"</options><script>alert('XSS')</script>
Persists in:
http://test/zabbix/hostgroups.php
http://test/zabbix/users.php
http://test/zabbix/hosts.php?form=update&hostid=N (where N is a valid hostid)
http://test/zabbix/scripts.php?form=1&scriptid=N (where N is a valid scriptid)
http://test/zabbix/maintenance.php
- is duplicated by
-
ZBX-4413 nbsp in "event generation" dropdown
- Closed