Summary
PRTG Traffic Grapher is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
PRTG Traffic Grapher 6.2.2.977 is vulnerable.
Solution
Updates are available. Please see http://www.paessler.com/prtg6 for more information.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-1849 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- AMSI 'file' Parameter Directory Traversal Vulnerability
- Apache Tomcat Information Disclosure Vulnerability
- Apache Tomcat Directory Listing and File disclosure
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- Apache Struts2/XWork Remote Command Execution Vulnerability