Monitorix 3.10.1 has been released!
Prior Monitorix versions are vulnerable to cross-site scripting (XSS),
caused by improper validation of user-supplied input by the
monitorix.cgi file. A remote attacker could exploit this vulnerability
using some of the arguments provided (graph= or when=) in a
specially-crafted URL to execute script in a victim's Web browser within
the security context of the hosting Web site, once the URL is clicked.
An attacker could use this vulnerability to steal the victim's
cookie-based authentication credentials.
I would like to thank Sebastian Gilon from TestArmy for reporting that
issue.
The rest of bugs fixed are, as always, reflected in the Changes file.
All users still using older versions are advised and encouraged to
upgrade to this version, which resolves this security issue.
Regards.
--
Jordi Sanfeliu
FIBRANET Network Services Provider
http://www.fibranet.cat
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Monitorix-general mailing list
Monitorix-general@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/monitorix-general