Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
[
{
"source": "https://bitbucket.org/tildeslash/monit@328f60773057641c4b2075fab9820145e95b728c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2019-11454-0dc3f653",
"target": {
"file": "src/http/cervlet.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"192760338526727209623324117128154017375",
"176363103172019343482822146618895062539",
"268951090696583617304681140437510744709",
"59623480104490707459496006942355571950"
]
}
},
{
"source": "https://bitbucket.org/tildeslash/monit@328f60773057641c4b2075fab9820145e95b728c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2019-11454-a558f63e",
"target": {
"function": "do_viewlog",
"file": "src/http/cervlet.c"
},
"signature_type": "Function",
"digest": {
"length": 1120.0,
"function_hash": "316469937887899855624336538781855417458"
}
}
]