UBUNTU-CVE-2016-2058

Source
https://ubuntu.com/security/CVE-2016-2058
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2058.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-2058
Related
Published
2016-04-13T16:59:00Z
Modified
2025-01-13T10:21:12Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Multiple cross-site scripting (XSS) vulnerabilities in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow (1) remote Xymon clients to inject arbitrary web script or HTML via a status-message, which is not properly handled in the "detailed status" page, or (2) remote authenticated users to inject arbitrary web script or HTML via an acknowledgement message, which is not properly handled in the "status" page.

References

Affected packages

Ubuntu:16.04:LTS / xymon

Package

Name
xymon
Purl
pkg:deb/ubuntu/xymon@4.3.25-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.25-1

Affected versions

4.*

4.3.21-1
4.3.21-2
4.3.22~beta-1
4.3.24-1
4.3.24-2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-client"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-client-dbgsym"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-dbgsym"
        }
    ]
}