Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2019-9834First vendor Publication2019-03-15
VendorCveLast vendor Modification2019-07-13

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

** DISPUTED ** The Netdata web application through 1.13.0 allows remote attackers to inject their own malicious HTML code into an imported snapshot, aka HTML Injection. Successful exploitation will allow attacker-supplied HTML to run in the context of the affected browser, potentially allowing the attacker to steal authentication credentials or to control how the site is rendered to the user. NOTE: the vendor disputes the risk because there is a clear warning next to the button for importing a snapshot.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9834

CWE : Common Weakness Enumeration

%idName
100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application2

Sources (Detail)

SourceUrl
EXPLOIT-DB https://www.exploit-db.com/exploits/46545
MISC https://github.com/netdata/netdata/issues/5800#issuecomment-510986112
https://www.youtube.com/watch?v=zSG93yX0B8k

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-07-14 09:19:10
  • Multiple Updates
2019-06-19 12:10:23
  • Multiple Updates
2019-03-18 21:19:30
  • Multiple Updates
2019-03-15 21:19:25
  • First insertion