Bug 989759 (CVE-2016-6209) - VUL-1: CVE-2016-6209: nagios: Reflected XSS vulnerability and possible phishing vector
Summary: VUL-1: CVE-2016-6209: nagios: Reflected XSS vulnerability and possible phishi...
Status: RESOLVED FIXED
Alias: CVE-2016-6209
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Lars Vogdt
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/170975/
Whiteboard: CVSSv2:SUSE:CVE-2016-6209:4.3:(AV:N/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-07-20 11:58 UTC by Andreas Stieger
Modified: 2021-05-16 01:15 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2016-07-20 11:58:39 UTC
http://seclists.org/fulldisclosure/2016/Jun/20

corewindow can be used to phish users:
http://jdoe:jdoe () nagioscore demos nagios com/nagios/index.php?corewindow=http://wikipedia.com

also to perform xss:
http://jdoe:jdoe () nagioscore demos nagios 
com/nagios/index.php?corewindow=javascript://zz%250a;onload=alert(document.domain)//


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1346217
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6209
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-6209.html
Comment 1 Swamp Workflow Management 2016-07-20 22:02:33 UTC
bugbot adjusting priority
Comment 2 Lars Vogdt 2021-05-11 09:24:05 UTC
Fixes submitted for:
* openSUSE:Backports:SLE-15-SP1:Update
* openSUSE:Backports:SLE-15-SP2:Update
* openSUSE:Backports:SLE-15-SP3
* openSUSE:Leap:15.2:Update


This Nagios upgrade sums up multiple security fixes and other important
changes.

Security issues fixed in this upgrade:
* bsc#1172794 / CVE-2020-13977: Fixed postauth vulnerabilities in
                histogram.js, map.js, trends.js
* bsc#989759 / CVE-2016-6209 : The "corewindow" parameter has been
               disabled by default
* bsc#1014637 / CVE-2016-9566 : Fixed another root privilege escalation
* bsc#1182398 : nagios_upgrade.sh writing to log file in user controlled
                directory

Additional fixes:
* bsc#1003362 : new nagios-exec-start-post script
* Fixed Map display in Internet Explorer 11
* Fixed duplicate properties appearing in statusjson.cgi
* Fixed build process when using GCC 10
* Fixed HARD OK states triggering on the maximum check attempt
Comment 3 OBSbugzilla Bot 2021-05-11 09:50:10 UTC
This is an autogenerated message for OBS integration:
This bug (989759) was mentioned in
https://build.opensuse.org/request/show/892196 Backports:SLE-15-SP1 / nagios
https://build.opensuse.org/request/show/892197 Backports:SLE-15-SP2 / nagios
https://build.opensuse.org/request/show/892198 Backports:SLE-15-SP3 / nagios
https://build.opensuse.org/request/show/892199 15.2 / nagios
Comment 4 Swamp Workflow Management 2021-05-12 19:15:47 UTC
openSUSE-SU-2021:0715-1: An update that solves two vulnerabilities and has three fixes is now available.

Category: security (important)
Bug References: 1003362,1014637,1172794,1182398,989759
CVE References: CVE-2016-6209,CVE-2020-13977
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    nagios-4.4.6-lp152.2.3.1
Comment 5 Swamp Workflow Management 2021-05-16 01:15:54 UTC
openSUSE-SU-2021:0735-1: An update that solves two vulnerabilities and has three fixes is now available.

Category: security (important)
Bug References: 1003362,1014637,1172794,1182398,989759
CVE References: CVE-2016-6209,CVE-2020-13977
JIRA References: 
Sources used:
openSUSE Backports SLE-15-SP2 (src):    nagios-4.4.6-bp152.2.3.1