{ "schema_version": "1.4.0", "id": "GHSA-hfwv-5hxg-8mqq", "modified": "2022-05-24T16:50:11Z", "published": "2022-05-24T16:50:11Z", "aliases": [ "CVE-2019-1010311" ], "details": "Tildeslash Monit Version 5.25.2 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Execute javascript in a victim s browser; disable all monitoring for a particular host or service. The component is: In function do_viewlog() on line 910 in Monit/src/http/cervlet.c, an attacker controlled log file is copied into an HTTP response without any HTML escaping. The attack vector is: An authenticated remote attacker can exploit the vulnerability over a network. The fixed version is: Version 5.25.3 and later.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010311" }, { "type": "WEB", "url": "https://bitbucket.org/tildeslash/monit/commits/1a8295eab6815072a18019b668fe084945b751f3" }, { "type": "WEB", "url": "https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c" }, { "type": "WEB", "url": "https://github.com/dzflack/exploits/blob/master/unix/monit_xss.py" } ], "database_specific": { "cwe_ids": [], "severity": null, "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-12T18:15:00Z" } }