From ${URL} : Description A vulnerability has been reported in Ganglia, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the "view_name" parameter to views_view.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. The vulnerability is reported in version 3.5.7. Other versions may also be affected. Solution Fixed in the git repository. Provided and/or discovered by Reported by the vendor. Original Advisory https://bugzilla.redhat.com/show_bug.cgi?id=892823 http://www.openwall.com/lists/oss-security/2013/02/26/11
Bumped to 3.5.8 in tree which appears to have the fix for all the issues referenced in the redhat bug, in particular, this commit: https://github.com/ganglia/ganglia-web/commit/552965f33bf79d41ccbec3f1f26840c8bab54ad6
CVE-2013-1770 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1770): Cross-site scripting (XSS) vulnerability in views_view.php in Ganglia Web 3.5.7 allows remote attackers to inject arbitrary web script or HTML via the view_name parameter.
(In reply to Justin Bronder from comment #1) > Bumped to 3.5.8 in tree which appears to have the fix for all the issues > referenced in the redhat bug, in particular, this commit: > > https://github.com/ganglia/ganglia-web/commit/ > 552965f33bf79d41ccbec3f1f26840c8bab54ad6 is fine to stabilize 3.5.8-r1?
(In reply to Agostino Sarubbo from comment #3) > is fine to stabilize 3.5.8-r1? Sure.
Arches, please test and mark stable: =sys-cluster/ganglia-web-3.5.8-r1 target KEYWORDS="amd64 ppc x86"
amd64 stable
x86 stable
ppc stable. Maintainer(s), please cleanup. Security, please vote.
Arches and Maintainer(s), Thank you for your work. Closing no GLSA for Cross Site Scripting