Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-9834

Опубликовано: 15 мар. 2019
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 4.3
CVSS3: 6.1

Описание

The Netdata web application through 1.13.0 allows remote attackers to inject their own malicious HTML code into an imported snapshot, aka HTML Injection. Successful exploitation will allow attacker-supplied HTML to run in the context of the affected browser, potentially allowing the attacker to steal authentication credentials or to control how the site is rendered to the user. NOTE: the vendor disputes the risk because there is a clear warning next to the button for importing a snapshot

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

disputed
eoan

ignored

end of life
esm-apps/bionic

not-affected

disputed
esm-apps/focal

not-affected

disputed
esm-apps/jammy

not-affected

disputed
esm-apps/noble

not-affected

disputed
esm-infra-legacy/trusty

DNE

focal

not-affected

disputed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 92%
0.08272
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 6 лет назад

The Netdata web application through 1.13.0 allows remote attackers to inject their own malicious HTML code into an imported snapshot, aka HTML Injection. Successful exploitation will allow attacker-supplied HTML to run in the context of the affected browser, potentially allowing the attacker to steal authentication credentials or to control how the site is rendered to the user. NOTE: the vendor disputes the risk because there is a clear warning next to the button for importing a snapshot

CVSS3: 6.1
debian
больше 6 лет назад

The Netdata web application through 1.13.0 allows remote attackers to ...

CVSS3: 6.1
github
больше 3 лет назад

** DISPUTED ** The Netdata web application through 1.13.0 allows remote attackers to inject their own malicious HTML code into an imported snapshot, aka HTML Injection. Successful exploitation will allow attacker-supplied HTML to run in the context of the affected browser, potentially allowing the attacker to steal authentication credentials or to control how the site is rendered to the user. NOTE: the vendor disputes the risk because there is a clear warning next to the button for importing a snapshot.

EPSS

Процентиль: 92%
0.08272
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3